A SERVICE OF

logo

Contents v
Appendix C
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... C-1
Infrastructure Mode ................................................................................................. C-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ C-2
Network Name: Extended Service Set Identification (ESSID) ................................C-2
Authentication and WEP ................................................................................................ C-2
802.11 Authentication .............................................................................................. C-3
Open System Authentication ................................................................................... C-3
Shared Key Authentication ...................................................................................... C-4
Overview of WEP Parameters ................................................................................ C-5
Key Size .................................................................................................................. C-6
WEP Configuration Options .................................................................................... C-6
Wireless Channels ......................................................................................................... C-7
WPA Wireless Security .................................................................................................. C-8
How Does WPA Compare to WEP? ........................................................................ C-9
How Does WPA Compare to IEEE 802.11i? ........................................................ C-10
What are the Key Features of WPA Security? ...................................................... C-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. C-12
WPA Data Encryption Key Management ........................................................ C-14
Is WPA Perfect? .................................................................................................... C-16
Product Support for WPA ...................................................................................... C-16
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged ......C-16
Changes to Wireless Access Points ............................................................... C-17
Changes to Wireless Network Adapters ......................................................... C-17
Changes to Wireless Client Programs ............................................................ C-18
Glossary
List of Glossary Terms ................................................................................................... D-1
Index