Home > Netgear > Router > Netgear Router WGT624 V3 User Manual

Netgear Router WGT624 V3 User Manual

Here you can view all the pages of manual Netgear Router WGT624 V3 User Manual. The Netgear manuals for Router are available online for free. You can easily download all the documents as PDF.

Page 121

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
Wireless Networking Basics D-5
202-10090-01, April 2005
This process is illustrated below.
Figure 7-5:  Shared key authentication
Overview of WEP Parameters
Before enabling WEP on an 802.11 network, you must first consider what type of encryption you 
require and the key size you want to use. Typically, there are three WEP Encryption options 
available for 802.11 products:
1. Do Not Use WEP: The 802.11 network does not encrypt data. For...

Page 122

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
D-6 Wireless Networking Basics
202-10090-01, April 2005
Key Size
The IEEE 802.11 standard supports two types of WEP encryption: 40-bit and 128-bit.
The 64-bit WEP data encryption method allows for a five-character (40-bit) input. Additionally, 24 
factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. The 24 
factory-set bits are not user-configurable). This encryption key will be used to encrypt/decrypt...

Page 123

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
Wireless Networking Basics D-7
202-10090-01, April 2005
WEP Configuration Options
The WEP settings must match on all 802.11 devices that are within the same wireless network as 
identified by the SSID. In general, if your mobile clients will roam between access points, then all 
of the 802.11 access points and all of the 802.11 client adapters on the network must have the same 
WEP settings. 
Note: Whatever keys you enter for an AP, you...

Page 124

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
D-8 Wireless Networking Basics
202-10090-01, April 2005
Note: The available channels supported by the wireless products in various countries are different. 
For example, Channels 1 to 11 are supported in the U.S. and Canada, and Channels 1 to 13 are 
supported in Europe and Australia.
The preferred channel separation between the channels in neighboring wireless networks is 25 
MHz (5 channels). This means that you can apply up to three...

Page 125

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
Wireless Networking Basics D-9
202-10090-01, April 2005
WPA and WPA2 offer the following benefits: 
• Enhanced data privacy
• Robust key management
• Data origin authentication
• Data integrity protection 
The Wi-Fi Alliance is now performing interoperability certification testing on Wi-Fi Protected 
Access products. Starting August of 2003, all new Wi-Fi certified products have to support WPA. 
NETGEAR is implementing WPA and WPA2 on...

Page 126

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
D-10 Wireless Networking Basics
202-10090-01, April 2005
How Does WPA Compare to WPA2 (IEEE 802.11i)?
WPA is forward compatible with the WPA2 security specification. WPA is a subset of WPA2 and 
used certain pieces of the early 802.11i draft, such as 802.1x and TKIP. The main pieces of WPA2 
that are not included in WPA are secure IBSS (Ad-Hoc mode), secure fast handoff (for specialized 
802.11 VoIP phones), as well as enhanced...

Page 127

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
Wireless Networking Basics D-11
202-10090-01, April 2005
The primary information conveyed in the Beacon frames is the authentication method and the 
cipher suite. Possible authentication methods include 802.1X and Pre-shared key. Pre-shared 
key is an authentication method that uses a statically configured pass phrase on both the 
stations and the access point. This obviates the need for an authentication server, which in 
many home and...

Page 128

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
D-12 Wireless Networking Basics
202-10090-01, April 2005
WPA/WPA2 Authentication: Enterprise-level User  
Authentication via 802.1x/EAP and RADIUS
Figure 4-6:  WPA/WPA2 Overview
IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a 
protected network, as well as providing a vehicle for dynamically varying data encryption keys via 
EAP from a RADIUS server, for example. This framework enables...

Page 129

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
Wireless Networking Basics D-13
202-10090-01, April 2005 Figure 4-7:  802.1x Authentication Sequence
The AP sends Beacon Frames with WPA/WPA2 information element to the stations in the service 
set. Information elements include the required authentication method (802.1x or Pre-shared key) 
and the preferred cipher suite (WEP, TKIP, or AES). Probe Responses (AP to station) and 
Association Requests (station to AP) also contain WPA...

Page 130

Reference Manual for the 108 Mbps Wireless Firewall Router WGT624 v3
D-14 Wireless Networking Basics
202-10090-01, April 2005
3.The client sends an EAP-response packet containing the identity to the authentication server. 
The access point responds by enabling a port for passing only EAP packets from the client to 
an authentication server located on the wired side of the access point. The access point blocks 
all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point can verify the...
Start reading Netgear Router WGT624 V3 User Manual

Related Manuals for Netgear Router WGT624 V3 User Manual

All Netgear manuals