x
Contents
802.11 Authentication
..............................................................................................
D-3
Open System Authentication
...................................................................................
D-4
Shared Key Authentication
......................................................................................
D-4
Overview of WEP Parameters
................................................................................
D-5
Key Size
..................................................................................................................
D-6
WEP Configuration Options
....................................................................................
D-7
Wireless Channels
.........................................................................................................
D-7
802/11b/g Wireless Channels
.................................................................................
D-8
802/11a Legal Power Output and Wireless Channels
.............................................
D-9
Appendix E
Virtual Private Networking
What is a VPN?
.............................................................................................................
E-1
What Is IPSec and How Does It Work?
.........................................................................
E-2
IPSec Security Features
.........................................................................................
E-2
IPSec Components
.................................................................................................
E-3
Encapsulating Security Payload (ESP)
...................................................................
E-3
Authentication Header (AH)
....................................................................................
E-4
IKE Security Association
.........................................................................................
E-5
Mode
.................................................................................................................
E-5
Key Management
....................................................................................................
E-6
Understand the Process Before You Begin
...................................................................
E-7
VPN Process Overview
.................................................................................................
E-7
Network Interfaces and Addresses
.........................................................................
E-8
Interface Addressing
.........................................................................................
E-8
Firewalls
...........................................................................................................
E-9
Setting Up a VPN Tunnel Between Gateways
........................................................
E-9
VPNC IKE Security Parameters
...................................................................................
E-11
VPNC IKE Phase I Parameters
..............................................................................
E-11
VPNC IKE Phase II Parameters
............................................................................
E-12
Testing and Troubleshooting
........................................................................................
E-12
Additional Reading
......................................................................................................
E-12
Glossary
List of Glossary Terms
...................................................................................................
G-1
Index