Home > Netgear > Router > Netgear Router WGR614 V5 User Manual

Netgear Router WGR614 V5 User Manual

Here you can view all the pages of manual Netgear Router WGR614 V5 User Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 151

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
Wireless Networking Basics D-11
June 2004 202-10036-01
The primary information conveyed in the Beacon frames is the authentication method and the 
cipher suite. Possible authentication methods include 802.1X and Pre-shared key. Pre-shared 
key is an authentication method that uses a statically configured pass phrase on both the 
stations and the access point. This obviates the need for an authentication server, which in 
many home and small...

Page 152

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
D-12 Wireless Networking Basics
June 2004 202-10036-01
WPA Authentication: Enterprise-level User  
Authentication via 802.1x/EAP and RADIUS
Figure D-3:  WPA Overview
IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a 
protected network, as well as providing a vehicle for dynamically varying data encryption keys via 
EAP from a RADIUS server, for example. This framework enables using a central...

Page 153

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
Wireless Networking Basics D-13
June 2004 202-10036-01 Figure D-4:  802.1x Authentication Sequence
The AP sends Beacon Frames with WPA information element to the stations in the service set.  
Information elements include the required authentication method (802.1x or Pre-shared key) and 
the preferred cipher suite (WEP, TKIP, or AES). Probe Responses (AP to station) and Association 
Requests (station to AP) also contain WPA information elements....

Page 154

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
D-14 Wireless Networking Basics
June 2004 202-10036-01
3.The client sends an EAP-response packet containing the identity to the authentication server. 
The access point responds by enabling a port for passing only EAP packets from the client to 
an authentication server located on the wired side of the access point. The access point blocks 
all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point can verify the 
clients...

Page 155

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
Wireless Networking Basics D-15
June 2004 202-10036-01
Temporal Key Integrity Protocol (TKIP)
WPA uses TKIP to provide important data encryption enhancements including a per-packet key 
mixing function, a message integrity check (MIC) named Michael, an extended initialization 
vector (IV) with sequencing rules, and a re-keying mechanism. TKIP also provides for the 
following: 
• The verification of the security configuration after the encryption...

Page 156

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
D-16 Wireless Networking Basics
June 2004 202-10036-01
Is WPA Perfect?
WPA is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS) 
attacks. If the access point receives two data packets that fail the Message Integrity Code (MIC) 
check within 60 seconds of each other then the network is under an active attack, and as a result, 
the access point employs counter measures, which includes disassociating each...

Page 157

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
Wireless Networking Basics D-17
June 2004 202-10036-01
•The new WPA information element 
To advertise their support of WPA, wireless APs send the beacon frame with a new 802.11 
WPA information element that contains the wireless APs security configuration (encryption 
algorithms and wireless security configuration information). 
•The WPA two-phase authentication 
Open system, then 802.1x (EAP with RADIUS or preshared key). 
•TKIP 
•Michael 
•AES...

Page 158

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
D-18 Wireless Networking Basics
June 2004 202-10036-01
Changes to Wireless Client Programs
Wireless client programs must be updated to permit the configuration of WPA authentication (and 
preshared key) and the new WPA encryption algorithms (TKIP and the optional AES component).
To obtain the Microsoft WPA client program, visit the following Microsoft Web site. 

Page 159

June 2004 202-10036-01 Glossary
1
Glossary
Use the list below to find definitions for technical terms used in this manual.
List of Glossary Terms
10BASE-T 
IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring.
100BASE-Tx 
IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring.
802.1x
802.1x defines port-based, network access control used to provide authenticated network access and 
automated data encryption key management. 
The IEEE 802.1x draft standard offers an...

Page 160

Reference Manual for the 54 Mbps Wireless Router WGR614 v5
2Glossary
June 2004 202-10036-01
ADSL requires a special ADSL modem. ADSL is growing in popularity as more areas around the world 
gain access. 
AES
Advanced Encryption Standard, a symmetric 128-bit block data encryption technique. 
It is an iterated block cipher with a variable block length and a variable key length. The block length and the 
key length can be independently specified to 128, 192 or 256 bits.The U.S government adopted the...
Start reading Netgear Router WGR614 V5 User Manual

Related Manuals for Netgear Router WGR614 V5 User Manual

All Netgear manuals