Netgear Router WGT624 V3 User Manual
Here you can view all the pages of manual Netgear Router WGT624 V3 User Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 121
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Wireless Networking Basics D-5 202-10090-01, April 2005 This process is illustrated below. Figure 7-5: Shared key authentication Overview of WEP Parameters Before enabling WEP on an 802.11 network, you must first consider what type of encryption you require and the key size you want to use. Typically, there are three WEP Encryption options available for 802.11 products: 1. Do Not Use WEP: The 802.11 network does not encrypt data. For...
Page 122
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 D-6 Wireless Networking Basics 202-10090-01, April 2005 Key Size The IEEE 802.11 standard supports two types of WEP encryption: 40-bit and 128-bit. The 64-bit WEP data encryption method allows for a five-character (40-bit) input. Additionally, 24 factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. The 24 factory-set bits are not user-configurable). This encryption key will be used to encrypt/decrypt...
Page 123
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Wireless Networking Basics D-7 202-10090-01, April 2005 WEP Configuration Options The WEP settings must match on all 802.11 devices that are within the same wireless network as identified by the SSID. In general, if your mobile clients will roam between access points, then all of the 802.11 access points and all of the 802.11 client adapters on the network must have the same WEP settings. Note: Whatever keys you enter for an AP, you...
Page 124
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 D-8 Wireless Networking Basics 202-10090-01, April 2005 Note: The available channels supported by the wireless products in various countries are different. For example, Channels 1 to 11 are supported in the U.S. and Canada, and Channels 1 to 13 are supported in Europe and Australia. The preferred channel separation between the channels in neighboring wireless networks is 25 MHz (5 channels). This means that you can apply up to three...
Page 125
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Wireless Networking Basics D-9 202-10090-01, April 2005 WPA and WPA2 offer the following benefits: • Enhanced data privacy • Robust key management • Data origin authentication • Data integrity protection The Wi-Fi Alliance is now performing interoperability certification testing on Wi-Fi Protected Access products. Starting August of 2003, all new Wi-Fi certified products have to support WPA. NETGEAR is implementing WPA and WPA2 on...
Page 126
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 D-10 Wireless Networking Basics 202-10090-01, April 2005 How Does WPA Compare to WPA2 (IEEE 802.11i)? WPA is forward compatible with the WPA2 security specification. WPA is a subset of WPA2 and used certain pieces of the early 802.11i draft, such as 802.1x and TKIP. The main pieces of WPA2 that are not included in WPA are secure IBSS (Ad-Hoc mode), secure fast handoff (for specialized 802.11 VoIP phones), as well as enhanced...
Page 127
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Wireless Networking Basics D-11 202-10090-01, April 2005 The primary information conveyed in the Beacon frames is the authentication method and the cipher suite. Possible authentication methods include 802.1X and Pre-shared key. Pre-shared key is an authentication method that uses a statically configured pass phrase on both the stations and the access point. This obviates the need for an authentication server, which in many home and...
Page 128
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 D-12 Wireless Networking Basics 202-10090-01, April 2005 WPA/WPA2 Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS Figure 4-6: WPA/WPA2 Overview IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a protected network, as well as providing a vehicle for dynamically varying data encryption keys via EAP from a RADIUS server, for example. This framework enables...
Page 129
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 Wireless Networking Basics D-13 202-10090-01, April 2005 Figure 4-7: 802.1x Authentication Sequence The AP sends Beacon Frames with WPA/WPA2 information element to the stations in the service set. Information elements include the required authentication method (802.1x or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). Probe Responses (AP to station) and Association Requests (station to AP) also contain WPA...
Page 130
Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3 D-14 Wireless Networking Basics 202-10090-01, April 2005 3.The client sends an EAP-response packet containing the identity to the authentication server. The access point responds by enabling a port for passing only EAP packets from the client to an authentication server located on the wired side of the access point. The access point blocks all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point can verify the...