Netgear Router WGR614 V5 User Manual
Here you can view all the pages of manual Netgear Router WGR614 V5 User Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 151
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Wireless Networking Basics D-11 June 2004 202-10036-01 The primary information conveyed in the Beacon frames is the authentication method and the cipher suite. Possible authentication methods include 802.1X and Pre-shared key. Pre-shared key is an authentication method that uses a statically configured pass phrase on both the stations and the access point. This obviates the need for an authentication server, which in many home and small...
Page 152
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 D-12 Wireless Networking Basics June 2004 202-10036-01 WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS Figure D-3: WPA Overview IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a protected network, as well as providing a vehicle for dynamically varying data encryption keys via EAP from a RADIUS server, for example. This framework enables using a central...
Page 153
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Wireless Networking Basics D-13 June 2004 202-10036-01 Figure D-4: 802.1x Authentication Sequence The AP sends Beacon Frames with WPA information element to the stations in the service set. Information elements include the required authentication method (802.1x or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). Probe Responses (AP to station) and Association Requests (station to AP) also contain WPA information elements....
Page 154
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 D-14 Wireless Networking Basics June 2004 202-10036-01 3.The client sends an EAP-response packet containing the identity to the authentication server. The access point responds by enabling a port for passing only EAP packets from the client to an authentication server located on the wired side of the access point. The access point blocks all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point can verify the clients...
Page 155
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Wireless Networking Basics D-15 June 2004 202-10036-01 Temporal Key Integrity Protocol (TKIP) WPA uses TKIP to provide important data encryption enhancements including a per-packet key mixing function, a message integrity check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. TKIP also provides for the following: • The verification of the security configuration after the encryption...
Page 156
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 D-16 Wireless Networking Basics June 2004 202-10036-01 Is WPA Perfect? WPA is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS) attacks. If the access point receives two data packets that fail the Message Integrity Code (MIC) check within 60 seconds of each other then the network is under an active attack, and as a result, the access point employs counter measures, which includes disassociating each...
Page 157
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 Wireless Networking Basics D-17 June 2004 202-10036-01 •The new WPA information element To advertise their support of WPA, wireless APs send the beacon frame with a new 802.11 WPA information element that contains the wireless APs security configuration (encryption algorithms and wireless security configuration information). •The WPA two-phase authentication Open system, then 802.1x (EAP with RADIUS or preshared key). •TKIP •Michael •AES...
Page 158
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 D-18 Wireless Networking Basics June 2004 202-10036-01 Changes to Wireless Client Programs Wireless client programs must be updated to permit the configuration of WPA authentication (and preshared key) and the new WPA encryption algorithms (TKIP and the optional AES component). To obtain the Microsoft WPA client program, visit the following Microsoft Web site.
Page 159
June 2004 202-10036-01 Glossary 1 Glossary Use the list below to find definitions for technical terms used in this manual. List of Glossary Terms 10BASE-T IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring. 100BASE-Tx IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring. 802.1x 802.1x defines port-based, network access control used to provide authenticated network access and automated data encryption key management. The IEEE 802.1x draft standard offers an...
Page 160
Reference Manual for the 54 Mbps Wireless Router WGR614 v5 2Glossary June 2004 202-10036-01 ADSL requires a special ADSL modem. ADSL is growing in popularity as more areas around the world gain access. AES Advanced Encryption Standard, a symmetric 128-bit block data encryption technique. It is an iterated block cipher with a variable block length and a variable key length. The block length and the key length can be independently specified to 128, 192 or 256 bits.The U.S government adopted the...