NETGEAR FWG114P Reference Manual page 10

Prosafe wireless 802.11g firewall/print server
Hide thumbs Also See for FWG114P:
Table of Contents

Advertisement

Verifying the Readiness of Your Internet Account ....................................................... C-18
Are Login Protocols Used? ................................................................................... C-18
What Is Your Configuration Information? .............................................................. C-18
Restarting the Network ................................................................................................ C-21
Appendix D
Wireless Networking Overview ...................................................................................... D-1
Infrastructure Mode ................................................................................................. D-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ D-2
Network Name: Extended Service Set Identification (ESSID) ................................ D-2
Authentication and WEP Data Encryption ..................................................................... D-2
802.11 Authentication .............................................................................................. D-3
Open System Authentication ................................................................................... D-3
Shared Key Authentication ...................................................................................... D-4
Overview of WEP Parameters ................................................................................ D-5
Key Size .................................................................................................................. D-6
WEP Configuration Options .................................................................................... D-7
Wireless Channels ......................................................................................................... D-7
WPA Wireless Security .................................................................................................. D-8
How Does WPA Compare to WEP? ........................................................................ D-9
How Does WPA Compare to IEEE 802.11i? ........................................................ D-10
What are the Key Features of WPA Security? ...................................................... D-10
WPA Data Encryption Key Management ........................................................ D-14
Is WPA Perfect? .................................................................................................... D-16
Product Support for WPA ...................................................................................... D-16
Changes to Wireless Access Points ............................................................... D-17
Changes to Wireless Network Adapters ......................................................... D-17
Changes to Wireless Client Programs ............................................................ D-18
List of Glossary Terms ................................................................................................... G-1
x
M-10146-01
Contents

Advertisement

Table of Contents
loading

Table of Contents