WGM124 Setup Manual
Page 8
... D-4 WEP Open System Authentication D-5 WEP Shared Key Authentication D-6 Key Size and Configuration D-7 How to Use WEP Parameters D-8 WPA Wireless Security D-8 How Does WPA Compare to WEP D-9 How Does WPA Compare to IEEE 802.11i D-10 What are the Key Features...Key Management D-14 Is WPA Perfect? ...D-16 Product Support for WPA D-16 Supporting a Mixture of WPA and WEP Wireless Clients D-16 Changes to Wireless Access Points D-16 Changes to Wireless Network Adapters D-17 Changes to Wireless Client Programs D-18 Glossary List of Glossary Terms G-1 Index viii Contents December 2004
... D-4 WEP Open System Authentication D-5 WEP Shared Key Authentication D-6 Key Size and Configuration D-7 How to Use WEP Parameters D-8 WPA Wireless Security D-8 How Does WPA Compare to WEP D-9 How Does WPA Compare to IEEE 802.11i D-10 What are the Key Features...Key Management D-14 Is WPA Perfect? ...D-16 Product Support for WPA D-16 Supporting a Mixture of WPA and WEP Wireless Clients D-16 Changes to Wireless Access Points D-16 Changes to Wireless Network Adapters D-17 Changes to Wireless Client Programs D-18 Glossary List of Glossary Terms G-1 Index viii Contents December 2004
WGM124 Setup Manual
Page 23
... not be legal to operate the wireless features of the wireless router in a particular wireless network will need to participate in a region other than one of the browser interface. • Name (SSID). If you notice interference problems with another nearby access point. • Mode. This field identifies the region where the WGM124 can be necessary to 32...
... not be legal to operate the wireless features of the wireless router in a particular wireless network will need to participate in a region other than one of the browser interface. • Name (SSID). If you notice interference problems with another nearby access point. • Mode. This field identifies the region where the WGM124 can be necessary to 32...
WGM124 Setup Manual
Page 26
...WIRELESS FEATURE Wireless Access Point Wireless Access List (MAC Filtering) SSID broadcast Network Name (SSID) Wireless Security DEFAULT SETTING Enabled All wireless stations allowed Enabled NETGEAR Disabled Warning: The Network Name (SSID) and passphrase are shown below. You can restore these defaults with the Factory Default Restore button on the rear panel. NETGEAR Wireless Router... Setup Manual Default Factory Settings When you install the wireless router, use the procedures below to customize any of the settings to better meet your WGM124, the default...
...WIRELESS FEATURE Wireless Access Point Wireless Access List (MAC Filtering) SSID broadcast Network Name (SSID) Wireless Security DEFAULT SETTING Enabled All wireless stations allowed Enabled NETGEAR Disabled Warning: The Network Name (SSID) and passphrase are shown below. You can restore these defaults with the Factory Default Restore button on the rear panel. NETGEAR Wireless Router... Setup Manual Default Factory Settings When you install the wireless router, use the procedures below to customize any of the settings to better meet your WGM124, the default...
WGM124 Setup Manual
Page 81
... Electrical and Electronics Engineers (IEEE) 802.11g standard for configuring a wireless network - In the infrastructure mode, the wireless access point converts airwave data into the range of another and still maintain seamless network connection. Appendix D Wireless Networking Basics Wireless Networking Overview The wireless router conforms to multiple wireless network devices within a fixed range or area of coverage, interacting with...
... Electrical and Electronics Engineers (IEEE) 802.11g standard for configuring a wireless network - In the infrastructure mode, the wireless access point converts airwave data into the range of another and still maintain seamless network connection. Appendix D Wireless Networking Basics Wireless Networking Overview The wireless router conforms to multiple wireless network devices within a fixed range or area of coverage, interacting with...
WGM124 Setup Manual
Page 82
... Scientific, and Medical) band between 2.4 GHz and 2.5 GHz. Applying two channels that includes an access point, the ESSID is used , but may still be configured with no access points, the Basic Service Set Identification (BSSID) is used . Network Name: Extended Service Set Identification (...peer group networking. In this is no structure or fixed points to as SSID. There is the easiest and least expensive way to set up a wireless network. For the wireless devices in this configuration. NETGEAR Wireless Router Setup Manual Ad Hoc Mode (Peer-to the SSID as ...
... Scientific, and Medical) band between 2.4 GHz and 2.5 GHz. Applying two channels that includes an access point, the ESSID is used , but may still be configured with no access points, the Basic Service Set Identification (BSSID) is used . Network Name: Extended Service Set Identification (...peer group networking. In this is no structure or fixed points to as SSID. There is the easiest and least expensive way to set up a wireless network. For the wireless devices in this configuration. NETGEAR Wireless Router Setup Manual Ad Hoc Mode (Peer-to the SSID as ...
WGM124 Setup Manual
Page 84
... SSID option to the WGM124: 1. The access point authenticates the station. 6. The IEEE 802.11 standard defines two types of its SSID. By default, IEEE 802.11 wireless devices operate in to associate with the Ethernet network through an access point such as the one ...in range. 3. NETGEAR Wireless Router Setup Manual WEP Wireless Security The absence of authentication methods, Open System and Shared Key. With Shared Key authentication, only those computers that the device SSID matches the access point SSID. The station listens for messages from an access point that govern how...
... SSID option to the WGM124: 1. The access point authenticates the station. 6. The IEEE 802.11 standard defines two types of its SSID. By default, IEEE 802.11 wireless devices operate in to associate with the Ethernet network through an access point such as the one ...in range. 3. NETGEAR Wireless Router Setup Manual WEP Wireless Security The absence of authentication methods, Open System and Shared Key. With Shared Key authentication, only those computers that the device SSID matches the access point SSID. The station listens for messages from an access point that govern how...
WGM124 Setup Manual
Page 85
... in below . Wireless Networking Basics D-5 December 2004 NETGEAR Wireless Router Setup Manual • Shared Key Authentication requires that the station and the access point have the same WEP Key to the access point. 2. The station associates with the access point and joins the ... 802.11b Authentication Open System Steps 1) Authentication request sent to AP 2) AP authenticates Client attempting to connect 3) Client connects to network Access Point Cable/DSL ProSafeWirelessVPN Security Firewall PWR TEST IN TER N ET LNK W LA N LO CA L MODEL FVM318 100 ACT Enable LNK...
... in below . Wireless Networking Basics D-5 December 2004 NETGEAR Wireless Router Setup Manual • Shared Key Authentication requires that the station and the access point have the same WEP Key to the access point. 2. The station associates with the access point and joins the ... 802.11b Authentication Open System Steps 1) Authentication request sent to AP 2) AP authenticates Client attempting to connect 3) Client connects to network Access Point Cable/DSL ProSafeWirelessVPN Security Firewall PWR TEST IN TER N ET LNK W LA N LO CA L MODEL FVM318 100 ACT Enable LNK...
WGM124 Setup Manual
Page 86
NETGEAR Wireless Router Setup Manual WEP Shared Key Authentication This process is illustrated in below. 802.11b Authentication Shared Key Steps 1) Authentication request sent to AP 2) AP sends challenge text Client 3) Client encrypts attempting challenge text and to connect sends it back to AP Access Point Cable/DSL ProSafeWirelessVPN Security Firewall PWR TEST IN TER N ET...
NETGEAR Wireless Router Setup Manual WEP Shared Key Authentication This process is illustrated in below. 802.11b Authentication Shared Key Steps 1) Authentication request sent to AP 2) AP sends challenge text Client 3) Client encrypts attempting challenge text and to connect sends it back to AP Access Point Cable/DSL ProSafeWirelessVPN Security Firewall PWR TEST IN TER N ET...
WGM124 Setup Manual
Page 87
...generate a 64-bit encryption key. (The 24 factory-set and not user configurable. Similar to four WEP Keys. Typically, 802.11 access points can only store one 128-bit key. The two devices will be available outside of 104 user-configurable bits. When configured for 40...since the user-configurable portion of two hexadecimal digits (0-9 and A-F). Whatever keys you enter for the client adapter in the same order. NETGEAR Wireless Router Setup Manual Key Size and Configuration The IEEE 802.11 standard supports two types of two hexadecimal digits (0-9 and A-F). The 64-bit ...
...generate a 64-bit encryption key. (The 24 factory-set and not user configurable. Similar to four WEP Keys. Typically, 802.11 access points can only store one 128-bit key. The two devices will be available outside of 104 user-configurable bits. When configured for 40...since the user-configurable portion of two hexadecimal digits (0-9 and A-F). Whatever keys you enter for the client adapter in the same order. NETGEAR Wireless Router Setup Manual Key Size and Configuration The IEEE 802.11 standard supports two types of two hexadecimal digits (0-9 and A-F). The 64-bit ...
WGM124 Setup Manual
Page 88
...), is designed to work with existing 802.11 products and offers forward compatibility with 802.11i, the new wireless security architecture being defined in the IEEE. NETGEAR Wireless Router Setup Manual How to Use WEP Parameters Wired Equivalent Privacy (WEP) data encryption is used when the...use. Note: Some 802.11 access points also support Use WEP for 802.11 products: 1. However, the WGM124 does not offer this situation, the Wi-Fi Alliance announced a new security architecture in the standard soon became obvious. WPA Wireless Security Wi-Fi Protected Access (WPA) is a specification of ...
...), is designed to work with existing 802.11 products and offers forward compatibility with 802.11i, the new wireless security architecture being defined in the IEEE. NETGEAR Wireless Router Setup Manual How to Use WEP Parameters Wired Equivalent Privacy (WEP) data encryption is used when the...use. Note: Some 802.11 access points also support Use WEP for 802.11 products: 1. However, the WGM124 does not offer this situation, the Wi-Fi Alliance announced a new security architecture in the standard soon became obvious. WPA Wireless Security Wi-Fi Protected Access (WPA) is a specification of ...
WGM124 Setup Manual
Page 89
... TKIP replaces WEP with a new encryption algorithm that is required. Through these enhancements, TKIP addresses all access points and client wireless adapters on Wi-Fi Protected Access products. NETGEAR Wireless Router Setup Manual • Enhanced data privacy • Robust key management • Data origin authentication •..., all new Wi-Fi certified products will implement WPA on existing wireless devices to IETF's RFC 2284. WEP is a data encryption method and is that uses the calculation facilities present on client and access point products and make this available in WPA.
... TKIP replaces WEP with a new encryption algorithm that is required. Through these enhancements, TKIP addresses all access points and client wireless adapters on Wi-Fi Protected Access products. NETGEAR Wireless Router Setup Manual • Enhanced data privacy • Robust key management • Data origin authentication •..., all new Wi-Fi certified products will implement WPA on existing wireless devices to IETF's RFC 2284. WEP is a data encryption method and is that uses the calculation facilities present on client and access point products and make this available in WPA.
WGM124 Setup Manual
Page 90
... Wireless Networking Basics NETGEAR Wireless Router Setup Manual How Does WPA Compare to the network. The main pieces of the 802.11i draft that encompass 802.1X/EAP authentication and sophisticated key management and encryption techniques. Temporal Key Integrity Protocol (TKIP) - Its major operations include: • Network security capability determination. This infrastructure includes stations, access points...
... Wireless Networking Basics NETGEAR Wireless Router Setup Manual How Does WPA Compare to the network. The main pieces of the 802.11i draft that encompass 802.1X/EAP authentication and sophisticated key management and encryption techniques. Temporal Key Integrity Protocol (TKIP) - Its major operations include: • Network security capability determination. This infrastructure includes stations, access points...
WGM124 Setup Manual
Page 91
...to use. This obviates the need not authenticate using the Pre-shared key method then the supplicant need for authentication. Pre-shared key is required by WPA. 802.1X port access control prevents full access to the network until authentication completes. 802.1X EAPOL-...the stations and the access point. If the supplicant detects that integrates the authentication and data privacy functions. Mutual authentication is gained by WPA to distribute per-session keys to those stations successfully authenticated. Keys are not being spoofed. NETGEAR Wireless Router Setup Manual The ...
...to use. This obviates the need not authenticate using the Pre-shared key method then the supplicant need for authentication. Pre-shared key is required by WPA. 802.1X port access control prevents full access to the network until authentication completes. 802.1X EAPOL-...the stations and the access point. If the supplicant detects that integrates the authentication and data privacy functions. Mutual authentication is gained by WPA to distribute per-session keys to those stations successfully authenticated. Keys are not being spoofed. NETGEAR Wireless Router Setup Manual The ...
WGM124 Setup Manual
Page 92
...providing a vehicle for dynamically varying data encryption keys via 802.1x/EAP and RADIUS Wireless LAN WPA enabled wireless client with "supplicant" WPA enabled Access Point using pre-shared key or 802.1x Figure D-3: WPA Overview Wired Network with a Remote Authentication... use of a preshared key. Windows XP implements 802.1x natively, and several Netgear switch and wireless access point products support 802.1x. D-12 December 2004 Wireless Networking Basics NETGEAR Wireless Router Setup Manual WPA Authentication: Enterprise-level User Authentication via EAP from a RADIUS server...
...providing a vehicle for dynamically varying data encryption keys via 802.1x/EAP and RADIUS Wireless LAN WPA enabled wireless client with "supplicant" WPA enabled Access Point using pre-shared key or 802.1x Figure D-3: WPA Overview Wired Network with a Remote Authentication... use of a preshared key. Windows XP implements 802.1x natively, and several Netgear switch and wireless access point products support 802.1x. D-12 December 2004 Wireless Networking Basics NETGEAR Wireless Router Setup Manual WPA Authentication: Enterprise-level User Authentication via EAP from a RADIUS server...
WGM124 Setup Manual
Page 93
...WPA information elements. 1. Information elements include the required authentication method (802.1x or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). The access point replies with an authenticator (i.e., 802.11 access point). NETGEAR Wireless Router Setup Manual Client with a WPAenabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse, etc.) For example, a ...Responses (AP to station) and Association Requests (station to connect with an EAP-request identity message. The client sends an EAP-start message. Wireless Networking Basics December 2004 D-13
...WPA information elements. 1. Information elements include the required authentication method (802.1x or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). The access point replies with an authenticator (i.e., 802.11 access point). NETGEAR Wireless Router Setup Manual Client with a WPAenabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse, etc.) For example, a ...Responses (AP to station) and Association Requests (station to connect with an EAP-request identity message. The client sends an EAP-start message. Wireless Networking Basics December 2004 D-13
WGM124 Setup Manual
Page 94
... update the EAP authentication type to the client. 7. With WPA, rekeying of unicast encryption keys is synchronized between the wireless client and the wireless access point (AP). The access point uses the session keys to build, sign and encrypt an EAP key message that you can verify the client's identity using an...the key message to the authentication server. Additionally, 802.11 and 802.1x provide no mechanism to the connected wireless clients. NETGEAR Wireless Router Setup Manual 3. In typical 802.1x implementations, the client can automatically change is optional.
... update the EAP authentication type to the client. 7. With WPA, rekeying of unicast encryption keys is synchronized between the wireless client and the wireless access point (AP). The access point uses the session keys to build, sign and encrypt an EAP key message that you can verify the client's identity using an...the key message to the authentication server. Additionally, 802.11 and 802.1x provide no mechanism to the connected wireless clients. NETGEAR Wireless Router Setup Manual 3. In typical 802.1x implementations, the client can automatically change is optional.
WGM124 Setup Manual
Page 95
..., manufactured, and incrementally deployed. Michael also provides replay protection. A new frame counter in both the station and the access point. TKIP was a pragmatic compromise that is being detected by WPA beside TKIP is the advanced encryption standard (AES), although... are determined. • The synchronized changing of the unicast encryption key for each preshared key authentication. Wireless Networking Basics December 2004 D-15 NETGEAR Wireless Router Setup Manual Temporal Key Integrity Protocol (TKIP) WPA uses TKIP to provide important data encryption enhancements including ...
..., manufactured, and incrementally deployed. Michael also provides replay protection. A new frame counter in both the station and the access point. TKIP was a pragmatic compromise that is being detected by WPA beside TKIP is the advanced encryption standard (AES), although... are determined. • The synchronized changing of the unicast encryption key for each preshared key authentication. Wireless Networking Basics December 2004 D-15 NETGEAR Wireless Router Setup Manual Temporal Key Integrity Protocol (TKIP) WPA uses TKIP to provide important data encryption enhancements including ...
WGM124 Setup Manual
Page 96
... to be thought of as to the following : D-16 December 2004 Wireless Networking Basics During the association, the wireless AP determines which clients use WEP and which includes disassociating each station using the access point. NETGEAR Wireless Router Setup Manual Is WPA Perfect? If the access point receives two data packets that fail the Message Integrity Code (MIC) check...
... to be thought of as to the following : D-16 December 2004 Wireless Networking Basics During the association, the wireless AP determines which clients use WEP and which includes disassociating each station using the access point. NETGEAR Wireless Router Setup Manual Is WPA Perfect? If the access point receives two data packets that fail the Message Integrity Code (MIC) check...
WGM124 Setup Manual
Page 97
... system, then 802.1x (EAP with RADIUS or preshared key). • TKIP • Michael • AES (optional) To upgrade your wireless access points to support WPA, obtain a WPA firmware update from your wireless AP. NETGEAR Wireless Router Setup Manual • The new WPA information element To advertise their firmware updated to support the following: • The new...
... system, then 802.1x (EAP with RADIUS or preshared key). • TKIP • Michael • AES (optional) To upgrade your wireless access points to support WPA, obtain a WPA firmware update from your wireless AP. NETGEAR Wireless Router Setup Manual • The new WPA information element To advertise their firmware updated to support the following: • The new...
WGM124 Setup Manual
Page 101
NETGEAR Wireless Router Setup Manual MAC address The Media Access Control address is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection. PPP over...-bit hardware address assigned to the wireless network name. For the wireless devices in the wireless Access Point and to every network interface card. See also Wireless Network Name and ESSID. For example, consider the IP address 150.215.017.009. Point-to . PPPoE PPPoE. A method for a wireless PC card. router A device that forwards data between networks...
NETGEAR Wireless Router Setup Manual MAC address The Media Access Control address is a protocol for connecting remote hosts to the Internet over an always-on connection by simulating a dial-up connection. PPP over...-bit hardware address assigned to the wireless network name. For the wireless devices in the wireless Access Point and to every network interface card. See also Wireless Network Name and ESSID. For example, consider the IP address 150.215.017.009. Point-to . PPPoE PPPoE. A method for a wireless PC card. router A device that forwards data between networks...