Intel 3945ABG Network Card User Manual


 
reception of wireless data. WEP encryption provides two levels of security: 64-bit key
(sometimes referred to as 40-bit) or a 128-bit key (also known as 104-bit). For stronger
security, use a 128-bit key. If you use encryption, all wireless devices on your wireless
network must use the same encryption keys.
Wired Equivalent Privacy (WEP) encryption and shared authentication provides protection for
your data on the network. WEP uses an encryption key to encrypt data before transmitting
it. Only computers that use the same encryption key can access the network or decrypt the
encrypted data transmitted by other computers. Authentication provides an additional
validation process from the adapter to the access point.
The WEP encryption algorithm is vulnerable to passive and active network attacks. TKIP and
CKIP algorithms include enhancements to the WEP protocol that mitigate existing network
attacks and address its shortcomings.
Open and Shared Key authentication
IEEE 802.11 supports two types of network authentication methods: Open System and
Shared Key.
When Open authentication is used, any wireless station can request authentication.
The station that needs to authenticate with another wireless station sends an
authentication management request that contains the identity of the sending station.
The receiving station or access point grants any request for authentication. Open
authentication allows any device network access. If no encryption is enabled on the
network, any device that knows the Service Set Identifier (SSID) of the access point
can gain access to the network.
When Shared Key authentication is used, each wireless station is assumed to have
received a secret shared key over a secure channel that is independent from the
802.11 wireless network communications channel. Shared key authentication requires
that the client configure a static WEP key. The client access is granted only if it passes
a challenge-based authentication.
802.1x Authentication
How 802.1x Authentication Works
802.1x Features
Overview
802.1x authentication is independent of the 802.11 authentication process. The 802.1x
standard provides a framework for various authentication and key-management protocols.