Contents
v
October 2004
Appendix B
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
B-1
Infrastructure Mode
.................................................................................................
B-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
B-2
Network Name: Extended Service Set Identification (ESSID)
................................
B-2
Authentication and WEP Data Encryption
.....................................................................
B-2
802.11 Authentication
..............................................................................................
B-3
Open System Authentication
...................................................................................
B-3
Shared Key Authentication
......................................................................................
B-4
Overview of WEP Parameters
................................................................................
B-5
Key Size
..................................................................................................................
B-6
WEP Configuration Options
....................................................................................
B-7
Wireless Channels
.........................................................................................................
B-7
WPA Wireless Security
..................................................................................................
B-8
How Does WPA Compare to WEP?
........................................................................
B-9
How Does WPA Compare to IEEE 802.11i?
........................................................
B-10
What are the Key Features of WPA Security?
......................................................
B-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
B-12
WPA Data Encryption Key Management
........................................................
B-14
Is WPA Perfect?
....................................................................................................
B-16
Product Support for WPA
......................................................................................
B-16
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged
......
B-16
Changes to Wireless Access Points
...............................................................
B-17
Changes to Wireless Network Adapters
.........................................................
B-17
Changes to Wireless Client Programs
............................................................
B-18
Glossary
Index