MR814v3 Reference Manual
Page 6
...NETGEAR product registration, support, and documentation 3-16 Chapter 4 Wireless Configuration Observe Performance, Placement, and Range Guidelines 4-1 Implement Appropriate Wireless Security 4-2 Understanding Wireless Settings 4-3 Default Factory Settings 4-3 Basic Wireless Settings 4-3 Advanced Wireless Settings 4-6 Information to Gather Before Changing Basic Wireless Settings 4-7 How to Set Up and Test Basic Wireless Connectivity 4-8 How to Configure WEP 4-10 How to Configure WPA-PSK Wireless...6 Maintenance Viewing Router Status Information 6-1 Viewing a List of Attached ...
...NETGEAR product registration, support, and documentation 3-16 Chapter 4 Wireless Configuration Observe Performance, Placement, and Range Guidelines 4-1 Implement Appropriate Wireless Security 4-2 Understanding Wireless Settings 4-3 Default Factory Settings 4-3 Basic Wireless Settings 4-3 Advanced Wireless Settings 4-6 Information to Gather Before Changing Basic Wireless Settings 4-7 How to Set Up and Test Basic Wireless Connectivity 4-8 How to Configure WEP 4-10 How to Configure WPA-PSK Wireless...6 Maintenance Viewing Router Status Information 6-1 Viewing a List of Attached ...
MR814v3 Reference Manual
Page 10
WPA Wireless Security D-8 How Does WPA Compare to WEP D-9 How Does WPA Compare to IEEE 802.11i D-10 What are the Key Features of WPA Security D-10 WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS D-12 WPA Data Encryption Key Management D-14 Is WPA Perfect? ...D-16 Product Support for WPA D-16 Supporting a Mixture of WPA and WEP Wireless Clients D-16 Changes to Wireless Access Points D-16 Changes to Wireless Network Adapters D-17 Changes to Wireless Client Programs D-18 Glossary Index x Contents 202-10039-01
WPA Wireless Security D-8 How Does WPA Compare to WEP D-9 How Does WPA Compare to IEEE 802.11i D-10 What are the Key Features of WPA Security D-10 WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS D-12 WPA Data Encryption Key Management D-14 Is WPA Perfect? ...D-16 Product Support for WPA D-16 Supporting a Mixture of WPA and WEP Wireless Clients D-16 Changes to Wireless Access Points D-16 Changes to Wireless Network Adapters D-17 Changes to Wireless Client Programs D-18 Glossary Index x Contents 202-10039-01
MR814v3 Reference Manual
Page 15
... up to 253 personal computers. The MR814 v3 router provides the following features: • 802.11b Standards-based wireless networking • WPA-PSK wireless security. • Easy, web-based Smart Wizard configuration assistant • Content Filtering and Site Blocking Security • Built in firewall protects you can establish restricted access policies based on time-of the NETGEAR MR814 v3 Cable/DSL Wireless Router.
... up to 253 personal computers. The MR814 v3 router provides the following features: • 802.11b Standards-based wireless networking • WPA-PSK wireless security. • Easy, web-based Smart Wizard configuration assistant • Content Filtering and Site Blocking Security • Built in firewall protects you can establish restricted access policies based on time-of the NETGEAR MR814 v3 Cable/DSL Wireless Router.
MR814v3 Reference Manual
Page 16
... with Content Filtering Unlike simple Internet sharing NAT routers, the MR814 v3 is a true firewall, using stateful packet inspection to Internet content by passphrase. • WPA-PSK support. You can also configure the router to send immediate alert messages to access objectionable ...You can configure the router to E-mail the log to Internet locations or services that have the network name (SSID) can connect. Support for the MR814 v3 Cable/DSL Wireless Router 802.11b Standards-based Wireless Networking The MR814 v3 router includes an 802.11b-compliant wireless access point, providing...
... with Content Filtering Unlike simple Internet sharing NAT routers, the MR814 v3 is a true firewall, using stateful packet inspection to Internet content by passphrase. • WPA-PSK support. You can also configure the router to send immediate alert messages to access objectionable ...You can configure the router to E-mail the log to Internet locations or services that have the network name (SSID) can connect. Support for the MR814 v3 Cable/DSL Wireless Router 802.11b Standards-based Wireless Networking The MR814 v3 router includes an 802.11b-compliant wireless access point, providing...
MR814v3 Reference Manual
Page 42
... broadcast over 802.11 wireless networks at ranges of up to your needs. You can enhance the security of you can restrict access to only trusted computers o that unknown computers cannot wirelessly connect to access your wireless equipment. Unlike wired network data, your wireless data transmissions can allow for the MR814 v3 Cable/DSL Wireless Router Implement Appropriate Wireless Security Note...
... broadcast over 802.11 wireless networks at ranges of up to your needs. You can enhance the security of you can restrict access to only trusted computers o that unknown computers cannot wirelessly connect to access your wireless equipment. Unlike wired network data, your wireless data transmissions can allow for the MR814 v3 Cable/DSL Wireless Router Implement Appropriate Wireless Security Note...
MR814v3 Reference Manual
Page 45
... authentication encrypts the SSID and data. Note: Not all wireless adapter configuration utilities support WEP passphrase key generation. or 128-bit WEP Data Encryption, the MR814 v3 does perform 64- WPA-PSK WPA-Pre-shared Key performs authentication, uses 128-bit data encryption... with Service Pack 3 do include the client software that the MR814 v3 router and wireless stations match. • Open System With Open Network Authentication and 64- Reference Manual for the MR814 v3 Cable/DSL Wireless Router Table 4-1. Manually entered keys are case sensitive but passphrase characters are...
... authentication encrypts the SSID and data. Note: Not all wireless adapter configuration utilities support WEP passphrase key generation. or 128-bit WEP Data Encryption, the MR814 v3 does perform 64- WPA-PSK WPA-Pre-shared Key performs authentication, uses 128-bit data encryption... with Service Pack 3 do include the client software that the MR814 v3 router and wireless stations match. • Open System With Open Network Authentication and 64- Reference Manual for the MR814 v3 Cable/DSL Wireless Router Table 4-1. Manually entered keys are case sensitive but passphrase characters are...
MR814v3 Reference Manual
Page 48
.... Store this information in the following sections to the MR814 v3 firewall at http://www.routerlogin.net with the correct Passphrase. Figure 4-4: Wireless Settings menu 4-8 202-10039-01 Wireless Configuration How to WPA-PSK as well and are case sensitive. Reconfigure your needs...or using whatever LAN address and password you have established basic wireless connectivity, you click Apply. Reference Manual for the MR814 v3 Cable/DSL Wireless Router • If WPA-PSK Authentication is Used. - Click Wireless Settings in the network will be disconnected when you can enable...
.... Store this information in the following sections to the MR814 v3 firewall at http://www.routerlogin.net with the correct Passphrase. Figure 4-4: Wireless Settings menu 4-8 202-10039-01 Wireless Configuration How to WPA-PSK as well and are case sensitive. Reconfigure your needs...or using whatever LAN address and password you have established basic wireless connectivity, you click Apply. Reference Manual for the MR814 v3 Cable/DSL Wireless Router • If WPA-PSK Authentication is Used. - Click Wireless Settings in the network will be disconnected when you can enable...
MR814v3 Reference Manual
Page 51
... save your network. • Automatic - To configure WPA-PSK, follow these options, as defined by the IEEE 802.11 wireless communication standard. 6. NETGEAR is the same as nETgear. Click Apply to Configure WPA-PSK Wireless Security Note: Not all computers and Access Points in...same as aa. You can manually or automatically program the four data encryption keys. Click Wireless Settings the main menu and select WPA-PSK for the MR814 v3 Cable/DSL Wireless Router 4. Enter ten hexadecimal digits (any combination of printable characters in your settings. Reference Manual ...
... save your network. • Automatic - To configure WPA-PSK, follow these options, as defined by the IEEE 802.11 wireless communication standard. 6. NETGEAR is the same as nETgear. Click Apply to Configure WPA-PSK Wireless Security Note: Not all computers and Access Points in...same as aa. You can manually or automatically program the four data encryption keys. Click Wireless Settings the main menu and select WPA-PSK for the MR814 v3 Cable/DSL Wireless Router 4. Enter ten hexadecimal digits (any combination of printable characters in your settings. Reference Manual ...
MR814v3 Reference Manual
Page 52
... whose MAC address is on the access control list to make any further changes. 2. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Figure 4-6: WPA Settings menu 2. Enter a word or group of the MR814 v3. 3. Click Wireless Settings in the Advanced section of the main menu of 8-63 printable characters in the Password Phrase box. 3. How to...
... whose MAC address is on the access control list to make any further changes. 2. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Figure 4-6: WPA Settings menu 2. Enter a word or group of the MR814 v3. 3. Click Wireless Settings in the Advanced section of the main menu of 8-63 printable characters in the Password Phrase box. 3. How to...
MR814v3 Reference Manual
Page 144
... standards-based, interoperable security enhancements that remedies the short comings of WEP. WPA Wireless Security Wi-Fi Protected Access (WPA) is designed to secure 802.11b (Wi-Fi) WLANs, but inherent weaknesses in the standard soon became obvious. Reference Manual for the MR814 v3 Cable/DSL Wireless Router WEP Configuration Options The WEP settings must match on all of data...
... standards-based, interoperable security enhancements that remedies the short comings of WEP. WPA Wireless Security Wi-Fi Protected Access (WPA) is designed to secure 802.11b (Wi-Fi) WLANs, but inherent weaknesses in the standard soon became obvious. Reference Manual for the MR814 v3 Cable/DSL Wireless Router WEP Configuration Options The WEP settings must match on all of data...
MR814v3 Reference Manual
Page 145
... that the keys are cumbersome to IETF's RFC 2284. WPA user authentication is implemented using Temporal Key Integrity Protocol (TKIP) is required. NETGEAR will have to WEP? Wireless Networking Basics D-9 202-10039-01 Support for 802.1x authentication is optional. Reference Manual for the MR814 v3 Cable/DSL Wireless Router The Wi-Fi Alliance is now performing interoperability certification...
... that the keys are cumbersome to IETF's RFC 2284. WPA user authentication is implemented using Temporal Key Integrity Protocol (TKIP) is required. NETGEAR will have to WEP? Wireless Networking Basics D-9 202-10039-01 Support for 802.1x authentication is optional. Reference Manual for the MR814 v3 Cable/DSL Wireless Router The Wi-Fi Alliance is now performing interoperability certification...
MR814v3 Reference Manual
Page 146
...includes the authentication method (802.1X or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). WPA addresses most of operations that are secure IBSS (Ad-Hoc mode), secure fast handoff (for the MR814 v3 Cable/DSL Wireless Router How Does WPA Compare to market today, ...such as AES-CCMP. The RADIUS server holds (or has access to) user credentials (e.g., user names and passwords) and authenticates wireless users before they gain access to implement. ...
...includes the authentication method (802.1X or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). WPA addresses most of operations that are secure IBSS (Ad-Hoc mode), secure fast handoff (for the MR814 v3 Cable/DSL Wireless Router How Does WPA Compare to market today, ...such as AES-CCMP. The RADIUS server holds (or has access to) user credentials (e.g., user names and passwords) and authenticates wireless users before they gain access to implement. ...
MR814v3 Reference Manual
Page 147
... and the cipher suite. Reference Manual for the MR814 v3 Cable/DSL Wireless Router The primary information conveyed in many home and small office environments will not be available nor desirable. Pre-shared key is using full-blown 802.1X. This obviates the need not authenticate using the... of its weaknesses. • Data integrity. We'll talk more TKIP and AES when addressing data privacy below. • Authentication. WPA features a robust key generation/management system that uses a statically configured pass phrase on both the stations and the access point. TKIP includes...
... and the cipher suite. Reference Manual for the MR814 v3 Cable/DSL Wireless Router The primary information conveyed in many home and small office environments will not be available nor desirable. Pre-shared key is using full-blown 802.1X. This obviates the need not authenticate using the... of its weaknesses. • Data integrity. We'll talk more TKIP and AES when addressing data privacy below. • Authentication. WPA features a robust key generation/management system that uses a statically configured pass phrase on both the stations and the access point. TKIP includes...
MR814v3 Reference Manual
Page 148
... Netgear switch and wireless access point products support 802.1x. It's important to a protected network, as well as Transport Layer Security (EAP-TLS) or EAP Tunneled Transport Layer Security (EAP-TTLS) defines how the authentication takes place. Reference Manual for the MR814 v3 Cable/DSL Wireless Router WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS Wireless LAN WPA...
... Netgear switch and wireless access point products support 802.1x. It's important to a protected network, as well as Transport Layer Security (EAP-TLS) or EAP Tunneled Transport Layer Security (EAP-TTLS) defines how the authentication takes place. Reference Manual for the MR814 v3 Cable/DSL Wireless Router WPA Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS Wireless LAN WPA...
MR814v3 Reference Manual
Page 149
.... The access point replies with an EAP-request identity message. Wireless Networking Basics 202-10039-01 D-13 Reference Manual for the MR814 v3 Cable/DSL Wireless Router Client with a WPAenabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse, etc.) For example, a WPA-enabled AP For example, a RADIUS server 1 2 3 4 6 5 7 Figure D-2: 802.1x Authentication Sequence The AP sends Beacon Frames with...
.... The access point replies with an EAP-request identity message. Wireless Networking Basics 202-10039-01 D-13 Reference Manual for the MR814 v3 Cable/DSL Wireless Router Client with a WPAenabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse, etc.) For example, a WPA-enabled AP For example, a RADIUS server 1 2 3 4 6 5 7 Figure D-2: 802.1x Authentication Sequence The AP sends Beacon Frames with...
MR814v3 Reference Manual
Page 150
... having enough time to crack the key in current use. For the global encryption key, WPA includes a facility (the Information Element) for the MR814 v3 Cable/DSL Wireless Router 3. In typical 802.1x implementations, the client can automatically change encryption keys as often as a "pass through the...a result, you can verify the client's identity using an authentication server (e.g., RADIUS). 4. With WPA, rekeying of the key message to implement dynamic key exchange, the 802.1x authentication server can then use of the access point. If configured to define applicable encryption keys...
... having enough time to crack the key in current use. For the global encryption key, WPA includes a facility (the Information Element) for the MR814 v3 Cable/DSL Wireless Router 3. In typical 802.1x implementations, the client can automatically change encryption keys as often as a "pass through the...a result, you can verify the client's identity using an authentication server (e.g., RADIUS). 4. With WPA, rekeying of the key message to implement dynamic key exchange, the 802.1x authentication server can then use of the access point. If configured to define applicable encryption keys...
MR814v3 Reference Manual
Page 151
... calculation facilities available on existing wireless devices. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Temporal Key Integrity Protocol (TKIP) WPA uses TKIP to prevent replay attacks. With WPA, a method known as the optimal choice for Wi-Fi certification. This is viewed as Michael specifies a new algorithm that allows organizations to the 802.11 payload and encrypted...
... calculation facilities available on existing wireless devices. Reference Manual for the MR814 v3 Cable/DSL Wireless Router Temporal Key Integrity Protocol (TKIP) WPA uses TKIP to prevent replay attacks. With WPA, a method known as the optimal choice for Wi-Fi certification. This is viewed as Michael specifies a new algorithm that allows organizations to the 802.11 payload and encrypted...
MR814v3 Reference Manual
Page 152
... encryption key and alerts administrators, but it is a definite step forward in August, 2003, NETGEAR, Inc. However, a mixed mode supporting WPA and non-WPA clients would offer network security that fail the Message Integrity Code (MIC) check within 60 seconds...without its vulnerabilities. Product Support for the MR814 v3 Cable/DSL Wireless Router Is WPA Perfect? WPA requires software changes to the following : D-16 202-10039-01 Wireless Networking Basics All other then the network is completely invulnerable. WPA is susceptible to maintain their Wi-Fi ...
... encryption key and alerts administrators, but it is a definite step forward in August, 2003, NETGEAR, Inc. However, a mixed mode supporting WPA and non-WPA clients would offer network security that fail the Message Integrity Code (MIC) check within 60 seconds...without its vulnerabilities. Product Support for the MR814 v3 Cable/DSL Wireless Router Is WPA Perfect? WPA requires software changes to the following : D-16 202-10039-01 Wireless Networking Basics All other then the network is completely invulnerable. WPA is susceptible to maintain their Wi-Fi ...
MR814v3 Reference Manual
Page 153
... • AES (optional) To upgrade your wireless access points to support WPA, obtain a WPA firmware update from your wireless AP. The firmware is automatically updated when the wireless network adapter driver is obtain the new WPA-compatible driver and install the driver. Reference Manual for the MR814 v3 Cable/DSL Wireless Router • The new WPA information element To advertise their firmware...
... • AES (optional) To upgrade your wireless access points to support WPA, obtain a WPA firmware update from your wireless AP. The firmware is automatically updated when the wireless network adapter driver is obtain the new WPA-compatible driver and install the driver. Reference Manual for the MR814 v3 Cable/DSL Wireless Router • The new WPA information element To advertise their firmware...
MR814v3 Reference Manual
Page 154
To obtain the Microsoft WPA client program, visit the following Microsoft Web site. D-18 202-10039-01 Wireless Networking Basics Reference Manual for the MR814 v3 Cable/DSL Wireless Router Changes to Wireless Client Programs Wireless client programs must be updated to permit the configuration of WPA authentication (and preshared key) and the new WPA encryption algorithms (TKIP and the optional AES component).
To obtain the Microsoft WPA client program, visit the following Microsoft Web site. D-18 202-10039-01 Wireless Networking Basics Reference Manual for the MR814 v3 Cable/DSL Wireless Router Changes to Wireless Client Programs Wireless client programs must be updated to permit the configuration of WPA authentication (and preshared key) and the new WPA encryption algorithms (TKIP and the optional AES component).