Contents ix
202-10099-01, April 2005
Are Login P rotocols U sed? ................................................................................... C-20
W hat Is Your Configuration Information? .............................................................. C-20
Obtaining ISP Configuration Information for W ind ows C om p u ters ....................... C-21
Obtaining ISP Configuration Information for M acintosh C om p u ters ..................... C-22
R estarting the N etwork ................................................................................................ C-23
Appendix D
Wireless Networking Basics
W ireless N etworking O verview ...................................................................................... D -1
Infrastructure M ode ................................................................................................. D -1
Ad H oc M ode (P eer-to-P eer W orkgroup) ................................................................ D -2
N etwork N ame: E xtended Service Set Identification (ESSID ) ................................ D -2
Authentication and W EP D ata E ncryption ..................................................................... D -2
802.11 Authentication .............................................................................................. D -3
Open System Authentication ................................................................................... D -3
Shared Key Authentication ...................................................................................... D -4
Overview of W E P Parameters ................................................................................ D -5
Key Size .................................................................................................................. D -6
W E P Configuration Options .................................................................................... D -7
W ireless Channels ......................................................................................................... D -7
W PA and W PA2 W ireless Security ................................................................................ D -8
H ow D oes W PA Compare to W EP ? ........................................................................ D -9
How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................ D -10
W hat are the Key Features of W PA and W PA2 Security? .................................... D -10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/E AP and R AD IU S .................................................. D -12
W PA/W PA2 D ata E ncryption Key M anagement ............................................. D -14
Is W PA/W PA2 P erfect? ......................................................................................... D -1 6
P roduct Support for W PA/W PA2 ........................................................................... D -16
Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16
Changes to W ireless Access P oints ............................................................... D -17
Changes to W ireless N etwork Adapters ......................................................... D -17
Changes to W ireless C lient P rograms ............................................................ D -18
Glossary