202-10006-05, June 2005
xii
Contents
What are the Key Features of WPA Security?
......................................................
D-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
D-12
WPA Data Encryption Key Management
........................................................
D-14
Is WPA Perfect?
....................................................................................................
D-16
Product Support for WPA
......................................................................................
D-16
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged
......
D-16
Changes to Wireless Access Points
...............................................................
D-16
Changes to Wireless Network Adapters
.........................................................
D-17
Changes to Wireless Client Programs
............................................................
D-18
Appendix E
Virtual Private Networking
What is a VPN?
.............................................................................................................
E-1
What Is IPSec and How Does It Work?
.........................................................................
E-2
IPSec Security Features
.........................................................................................
E-2
IPSec Components
.................................................................................................
E-2
Encapsulating Security Payload (ESP)
...................................................................
E-3
Authentication Header (AH)
....................................................................................
E-4
IKE Security Association
.........................................................................................
E-4
Mode
.................................................................................................................
E-5
Key Management
....................................................................................................
E-6
Understand the Process Before You Begin
...................................................................
E-6
VPN Process Overview
.................................................................................................
E-7
Network Interfaces and Addresses
.........................................................................
E-7
Interface Addressing
.........................................................................................
E-7
Firewalls
...........................................................................................................
E-8
Setting Up a VPN Tunnel Between Gateways
........................................................
E-8
VPNC IKE Security Parameters
..................................................................................
E-10
VPNC IKE Phase I Parameters
.............................................................................
E-10
VPNC IKE Phase II Parameters
.............................................................................
E-11
Testing and Troubleshooting
.........................................................................................
E-11
Additional Reading
.......................................................................................................
E-11
Appendix F
NETGEAR VPN Configuration
DG834G to FVL328
........................................................................................................
F-1
Configuration Profile
.................................................................................................
F-1