Netgear MA111v2 User's Guide Page 8

  • Download
  • Add to my manuals
  • Print
  • Page
    / 83
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 7
202-10032-01
viii Contents
How to Start a Computer-to-Computer (Ad-Hoc) Network .......................................4-5
Enabling Wireless Security Features ..............................................................................4-5
Identifying the Wireless Network Name (SSID) and WEP Security Settings ...........4-6
How to Configure WEP Encryption Security ............................................................4-7
How to Configure WPA Encryption Security ............................................................4-8
Statistics Page ........................................................................................................4-10
Advanced Settings Page ........................................................................................4-10
Appendix A
Technical Specifications
Appendix B
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... B-1
Infrastructure Mode ................................................................................................. B-1
Ad-Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-2
Network Name: Extended Service Set Identification (ESSID) ................................ B-2
Wireless Channels ......................................................................................................... B-2
Authentication and WEP ................................................................................................ B-4
802.11 Authentication .............................................................................................. B-4
Open System Authentication ................................................................................... B-5
Shared Key Authentication ...................................................................................... B-5
Overview of WEP Parameters ................................................................................ B-6
Key Size .................................................................................................................. B-7
WEP Configuration Options .................................................................................... B-8
WPA Wireless Security .................................................................................................. B-8
How Does WPA Compare to WEP? ........................................................................ B-9
How Does WPA Compare to IEEE 802.11i? ........................................................ B-10
What are the Key Features of WPA Security? ...................................................... B-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. B-12
WPA Data Encryption Key Management ........................................................ B-14
Is WPA Perfect? .................................................................................................... B-16
Product Support for WPA ...................................................................................... B-16
Supporting a Mixture of WPA and WEP Wireless Clients ............................... B-16
Changes to Wireless Access Points ............................................................... B-16
Changes to Wireless Network Adapters ......................................................... B-17
Changes to Wireless Client Programs ............................................................ B-18
Page view 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 82 83

Comments to this Manuals

No comments