Contents
vii
202-10101-01, 4 May 2005
Appendix A
Technical Specifications
Appendix B
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
B-1
Infrastructure Mode
.................................................................................................
B-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
B-2
Network Name: Extended Service Set Identification (ESSID)
................................
B-2
Authentication and WEP Data Encryption
.....................................................................
B-2
802.11 Authentication
..............................................................................................
B-3
Open System Authentication
...................................................................................
B-3
Shared Key Authentication
......................................................................................
B-4
Overview of WEP Parameters
................................................................................
B-5
Key Size
..................................................................................................................
B-6
WEP Configuration Options
....................................................................................
B-7
Wireless Channels
.........................................................................................................
B-7
WPA and WPA2 Wireless Security
................................................................................
B-8
How Does WPA Compare to WEP?
........................................................................
B-9
How Does WPA Compare to WPA2 (IEEE 802.11i)?
............................................
B-10
What are the Key Features of WPA and WPA2 Security?
....................................
B-10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
B-12
WPA/WPA2 Data Encryption Key Management
.............................................
B-14
Is WPA/WPA2 Perfect?
.........................................................................................
B-16
Product Support for WPA/WPA2
...........................................................................
B-16
Supporting a Mixture of WPA, WPA2, and WEP
Wireless Clients is Discouraged
.....................................................................
B-16
Changes to Wireless Access Points
...............................................................
B-17
Changes to Wireless Network Adapters
.........................................................
B-17
Changes to Wireless Client Programs
............................................................
B-18
Glossary