Home > Netgear > Router > Netgear Router WGR614 V6 User Manual

Netgear Router WGR614 V6 User Manual

Here you can view all the pages of manual Netgear Router WGR614 V6 User Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 131

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
Wireless Networking Basics D-9
202-10099-01, April 2005
WPA and WPA2 offer the following benefits: 
• Enhanced data privacy
• Robust key management
• Data origin authentication
• Data integrity protection 
The Wi-Fi Alliance is now performing interoperability certification testing on Wi-Fi Protected 
Access products. Starting August of 2003, all new Wi-Fi certified products have to support WPA. 
NETGEAR is implementing WPA and WPA2 on client and...

Page 132

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
D-10 Wireless Networking Basics
202-10099-01, April 2005
How Does WPA Compare to WPA2 (IEEE 802.11i)?
WPA is forward compatible with the WPA2 security specification. WPA is a subset of WPA2 and 
used certain pieces of the early 802.11i draft, such as 802.1x and TKIP. The main pieces of WPA2 
that are not included in WPA are secure IBSS (Ad-Hoc mode), secure fast handoff (for specialized 
802.11 VoIP phones), as well as enhanced encryption...

Page 133

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
Wireless Networking Basics D-11
202-10099-01, April 2005
The primary information conveyed in the Beacon frames is the authentication method and the 
cipher suite. Possible authentication methods include 802.1X and Pre-shared key. Pre-shared 
key is an authentication method that uses a statically configured pass phrase on both the 
stations and the access point. This obviates the need for an authentication server, which in 
many home and small...

Page 134

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
D-12 Wireless Networking Basics
202-10099-01, April 2005
WPA/WPA2 Authentication: Enterprise-level User  
Authentication via 802.1x/EAP and RADIUS
Figure 4-3:  WPA/WPA2 Overview
IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a 
protected network, as well as providing a vehicle for dynamically varying data encryption keys via 
EAP from a RADIUS server, for example. This framework enables using a...

Page 135

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
Wireless Networking Basics D-13
202-10099-01, April 2005 Figure 4-4:  802.1x Authentication Sequence
The AP sends Beacon Frames with WPA/WPA2 information element to the stations in the service 
set. Information elements include the required authentication method (802.1x or Pre-shared key) 
and the preferred cipher suite (WEP, TKIP, or AES). Probe Responses (AP to station) and 
Association Requests (station to AP) also contain WPA information...

Page 136

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
D-14 Wireless Networking Basics
202-10099-01, April 2005
3.The client sends an EAP-response packet containing the identity to the authentication server. 
The access point responds by enabling a port for passing only EAP packets from the client to 
an authentication server located on the wired side of the access point. The access point blocks 
all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point can verify the 
clients...

Page 137

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
Wireless Networking Basics D-15
202-10099-01, April 2005
Temporal Key Integrity Protocol (TKIP)
WPA uses TKIP to provide important data encryption enhancements including a per-packet key 
mixing function, a message integrity check (MIC) named Michael, an extended initialization 
vector (IV) with sequencing rules, and a re-keying mechanism. TKIP also provides for the 
following: 
• The verification of the security configuration after the...

Page 138

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
D-16 Wireless Networking Basics
202-10099-01, April 2005
Is WPA/WPA2 Perfect?
WPA/WPA2 is not without its vulnerabilities. Specifically, it is susceptible to denial of service 
(DoS) attacks. If the access point receives two data packets that fail the message integrity code 
(MIC) within 60 seconds of each other, then the network is under an active attack, and as a result, 
the access point employs counter measures, which include disassociating...

Page 139

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
Wireless Networking Basics D-17
202-10099-01, April 2005
Changes to Wireless Access Points
Wireless access points must have their firmware updated to support the following: 
•The new WPA/WPA2 information element 
To advertise their support of WPA/WPA2, wireless APs send the beacon frame with a new 
802.11 WPA/WPA2 information element that contains the wireless APs security configuration 
(encryption algorithms and wireless security configuration...

Page 140

Reference Manual for the 54 Mbps Wireless Router WGR614 v6
D-18 Wireless Networking Basics
202-10099-01, April 2005
Microsoft has worked with many wireless vendors to embed the WPA driver update in the wireless 
adapter driver. So, to update your Microsoft Windows wireless client, all you have to do is obtain 
the new WPA/WPA2-compatible driver and install the driver. 
Changes to Wireless Client Programs
Wireless client programs must be updated to permit the configuration of WPA/WPA2 
authentication (and...
Start reading Netgear Router WGR614 V6 User Manual

Related Manuals for Netgear Router WGR614 V6 User Manual

All Netgear manuals