202-10032-01
viii
Contents
How to Start a Computer-to-Computer (Ad-Hoc) Network
.......................................
4-5
Enabling Wireless Security Features
..............................................................................
4-5
Identifying the Wireless Network Name (SSID) and WEP Security Settings
...........
4-6
How to Configure WEP Encryption Security
............................................................
4-7
How to Configure WPA Encryption Security
............................................................
4-8
Statistics Page
........................................................................................................
4-10
Advanced Settings Page
........................................................................................
4-10
Appendix A
Technical Specifications
Appendix B
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
B-1
Infrastructure Mode
.................................................................................................
B-1
Ad-Hoc Mode (Peer-to-Peer Workgroup)
................................................................
B-2
Network Name: Extended Service Set Identification (ESSID)
................................
B-2
Wireless Channels
.........................................................................................................
B-2
Authentication and WEP
................................................................................................
B-4
802.11 Authentication
..............................................................................................
B-4
Open System Authentication
...................................................................................
B-5
Shared Key Authentication
......................................................................................
B-5
Overview of WEP Parameters
................................................................................
B-6
Key Size
..................................................................................................................
B-7
WEP Configuration Options
....................................................................................
B-8
WPA Wireless Security
..................................................................................................
B-8
How Does WPA Compare to WEP?
........................................................................
B-9
How Does WPA Compare to IEEE 802.11i?
........................................................
B-10
What are the Key Features of WPA Security?
......................................................
B-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
B-12
WPA Data Encryption Key Management
........................................................
B-14
Is WPA Perfect?
....................................................................................................
B-16
Product Support for WPA
......................................................................................
B-16
Supporting a Mixture of WPA and WEP Wireless Clients
...............................
B-16
Changes to Wireless Access Points
...............................................................
B-16
Changes to Wireless Network Adapters
.........................................................
B-17
Changes to Wireless Client Programs
............................................................
B-18