NETGEAR WG302 Reference Manual page 9

Prosafe wireless access point 802.11g
Hide thumbs Also See for WG302:
Table of Contents

Advertisement

Specifications for the WG302 ........................................................................................ A-1
Appendix B
Wireless Networking Overview ...................................................................................... B-1
Infrastructure Mode ................................................................................................. B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-2
Network Name: Extended Service Set Identification (ESSID) ................................ B-2
Authentication and WEP Data Encryption ..................................................................... B-2
802.11 Authentication .............................................................................................. B-3
Open System Authentication ................................................................................... B-3
Shared Key Authentication ...................................................................................... B-4
Overview of WEP Parameters ................................................................................ B-5
Key Size .................................................................................................................. B-6
WEP Configuration Options .................................................................................... B-7
Wireless Channels ......................................................................................................... B-7
WPA Wireless Security .................................................................................................. B-8
How Does WPA Compare to WEP? ........................................................................ B-9
How Does WPA Compare to IEEE 802.11i? ........................................................ B-10
What are the Key Features of WPA Security? ...................................................... B-10
WPA Data Encryption Key Management ........................................................ B-14
Is WPA Perfect? .................................................................................................... B-16
Product Support for WPA ...................................................................................... B-16
Changes to Wireless Access Points ............................................................... B-17
Changes to Wireless Network Adapters ......................................................... B-17
Changes to Wireless Client Programs ............................................................ B-18
Command Sets .............................................................................................................. C-1
Glossary
Index
Contents
v

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents