Contents
ix
April 2006
Are Login Protocols Used?
...................................................................................
C-20
What Is Your Configuration Information?
..............................................................
C-20
Obtaining ISP Configuration Information for Windows Computers
.......................
C-21
Obtaining ISP Configuration Information for Macintosh Computers
.....................
C-22
Restarting the Network
................................................................................................
C-23
Appendix D
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
D-1
Infrastructure Mode
.................................................................................................
D-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
D-2
Network Name: Extended Service Set Identification (ESSID)
................................
D-2
Authentication and WEP Data Encryption
.....................................................................
D-2
802.11 Authentication
..............................................................................................
D-3
Open System Authentication
...................................................................................
D-3
Shared Key Authentication
......................................................................................
D-4
Overview of WEP Parameters
................................................................................
D-5
Key Size
..................................................................................................................
D-6
WEP Configuration Options
....................................................................................
D-7
Wireless Channels
.........................................................................................................
D-7
WPA and WPA2 Wireless Security
................................................................................
D-8
How Does WPA Compare to WEP?
........................................................................
D-9
How Does WPA Compare to WPA2 (IEEE 802.11i)?
............................................
D-10
What are the Key Features of WPA and WPA2 Security?
....................................
D-10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
D-12
WPA/WPA2 Data Encryption Key Management
.............................................
D-14
Is WPA/WPA2 Perfect?
.........................................................................................
D-16
Product Support for WPA/WPA2
...........................................................................
D-16
Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16
Changes to Wireless Access Points
...............................................................
D-17
Changes to Wireless Network Adapters
.........................................................
D-17
Changes to Wireless Client Programs
............................................................
D-18
Glossary