Contents
v
202-10083-01
Wireless Channels
..................................................................................................
B-2
WEP Wireless Security
..................................................................................................
B-4
WEP Authentication
................................................................................................
B-4
WEP Open System Authentication
.........................................................................
B-5
WEP Shared Key Authentication
............................................................................
B-6
Key Size and Configuration
..............................................................................
B-7
How to Use WEP Parameters
.................................................................................
B-8
WPA Wireless Security
..................................................................................................
B-8
How Does WPA Compare to WEP?
........................................................................
B-9
How Does WPA Compare to IEEE 802.11i?
..........................................................
B-9
What are the Key Features of WPA Security?
......................................................
B-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
...................................................
B-11
WPA Data Encryption Key Management
........................................................
B-14
Is WPA Perfect?
....................................................................................................
B-16
Product Support for WPA
......................................................................................
B-16
Supporting a Mixture of WPA and WEP Wireless Clients
...............................
B-16
Changes to Wireless Access Points
...............................................................
B-16
Changes to Wireless Network Adapters
.........................................................
B-17
Changes to Wireless Client Programs
............................................................
B-18
Glossary
Numeric
.........................................................................................................................
C-1
A
....................................................................................................................................
C-1
B
....................................................................................................................................
C-2
C
....................................................................................................................................
C-2
D
....................................................................................................................................
C-2
E
....................................................................................................................................
C-3
G
....................................................................................................................................
C-3
I
......................................................................................................................................
C-3
L
.....................................................................................................................................
C-4
M
....................................................................................................................................
C-4
N
....................................................................................................................................
C-5
P
....................................................................................................................................
C-5
Q
....................................................................................................................................
C-6
R
....................................................................................................................................
C-6