WGR614v6 Reference Manual
Page 9
... Information for Windows Computers C-21 Obtaining ISP Configuration Information for Macintosh Computers C-22 Restarting the Network C-23 Appendix D Wireless Networking Basics Wireless Networking Overview D-1 Infrastructure Mode D-1 Ad Hoc Mode (Peer-to-Peer Workgroup D-2 Network Name: Extended Service Set Identification...for WPA/WPA2 D-16 Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16 Changes to Wireless Access Points D-17 Changes to Wireless Network Adapters D-17 Changes to Wireless Client Programs D-18 Glossary Contents ix 202-10099-01, April 2005
... Information for Windows Computers C-21 Obtaining ISP Configuration Information for Macintosh Computers C-22 Restarting the Network C-23 Appendix D Wireless Networking Basics Wireless Networking Overview D-1 Infrastructure Mode D-1 Ad Hoc Mode (Peer-to-Peer Workgroup D-2 Network Name: Extended Service Set Identification...for WPA/WPA2 D-16 Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16 Changes to Wireless Access Points D-17 Changes to Wireless Network Adapters D-17 Changes to Wireless Client Programs D-18 Glossary Contents ix 202-10099-01, April 2005
WGR614v6 Reference Manual
Page 16
....11g Wireless Networking The WGR614 v6 router includes an 802.11g wireless access point, providing continuous, high-speed 54 Mbps access between your wireless and Ethernet devices. You can configure the router to E-mail the log to defend against hacker attacks. The WGR614 v6 will log security events such as Ping of Service (DoS) protection. Reference Manual for the 54 Mbps Wireless Router WGR614...
....11g Wireless Networking The WGR614 v6 router includes an 802.11g wireless access point, providing continuous, high-speed 54 Mbps access between your wireless and Ethernet devices. You can configure the router to E-mail the log to defend against hacker attacks. The WGR614 v6 will log security events such as Ping of Service (DoS) protection. Reference Manual for the 54 Mbps Wireless Router WGR614...
WGR614v6 Reference Manual
Page 32
... list. If your country or region is NETGEAR, but NETGEAR strongly recommends that fails, select the appropriate value - The default SSID is not listed, please check with another nearby access point. • Mode: Select the desired wireless mode. This field displays the region of ... up to the router. • Name (SSID): Enter a value of "Automatic." Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Note: Failure to follow these guidelines can be assigned to all PCs and Access Points in your network. 3-10 Configuring the Internet and Wireless Settings 202-10099-...
... list. If your country or region is NETGEAR, but NETGEAR strongly recommends that fails, select the appropriate value - The default SSID is not listed, please check with another nearby access point. • Mode: Select the desired wireless mode. This field displays the region of ... up to the router. • Name (SSID): Enter a value of "Automatic." Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Note: Failure to follow these guidelines can be assigned to all PCs and Access Points in your network. 3-10 Configuring the Internet and Wireless Settings 202-10099-...
WGR614v6 Reference Manual
Page 33
...configure the WEP Key(s). FEATURE Wireless Access Point Wireless Access List (MAC Filtering) SSID broadcast SSID 11b/g RF Channel Mode Authentication Type WEP DEFAULT FACTORY SETTINGS Enabled All wireless stations allowed Enabled NETGEAR 11 g and b Open System Disabled Configuring the Internet and Wireless Settings 202-10099-01, April...to 64 bit, then each of the four key boxes will be used and enter the matching WEP key information for the 54 Mbps Wireless Router WGR614 v6 • Automatic Key Generation (Passphrase): Enter a word or group of printable characters in the Passphrase box and...
...configure the WEP Key(s). FEATURE Wireless Access Point Wireless Access List (MAC Filtering) SSID broadcast SSID 11b/g RF Channel Mode Authentication Type WEP DEFAULT FACTORY SETTINGS Enabled All wireless stations allowed Enabled NETGEAR 11 g and b Open System Disabled Configuring the Internet and Wireless Settings 202-10099-01, April...to 64 bit, then each of the four key boxes will be used and enter the matching WEP key information for the 54 Mbps Wireless Router WGR614 v6 • Automatic Key Generation (Passphrase): Enter a word or group of printable characters in the Passphrase box and...
WGR614v6 Reference Manual
Page 123
...The 802.11 standard offers two methods for wireless LANs (WLANs). As a result, wireless clients can freely roam from 11 Mbps to 5.5, 2, and 1 Mbps when the radio signal is weak or when interference is detected. Wireless Networking Overview The WGR614 v6 router conforms to the Institute of Electrical and Electronics...rate sensing rates are 1, 2, 5.5, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps. The maximum data rate for the 802.11b wireless link is 11 Mbps, but it will automatically back down from one access point, it moves into wired Ethernet data, acting as a bridge between the wired LAN and...
...The 802.11 standard offers two methods for wireless LANs (WLANs). As a result, wireless clients can freely roam from 11 Mbps to 5.5, 2, and 1 Mbps when the radio signal is weak or when interference is detected. Wireless Networking Overview The WGR614 v6 router conforms to the Institute of Electrical and Electronics...rate sensing rates are 1, 2, 5.5, 6, 9, 12, 18, 24, 36, 48, and 54 Mbps. The maximum data rate for the 802.11b wireless link is 11 Mbps, but it will automatically back down from one access point, it moves into wired Ethernet data, acting as a bridge between the wired LAN and...
WGR614v6 Reference Manual
Page 124
... Name: Extended Service Set Identification (ESSID) The Extended Service Set Identification (ESSID) is no access points, the Basic Service Set Identification (BSSID) is the easiest and least expensive way to set up a wireless network. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Ad Hoc Mode (Peer-to-Peer Workgroup) In an ad hoc network, computers...
... Name: Extended Service Set Identification (ESSID) The Extended Service Set Identification (ESSID) is no access points, the Basic Service Set Identification (BSSID) is the easiest and least expensive way to set up a wireless network. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Ad Hoc Mode (Peer-to-Peer Workgroup) In an ad hoc network, computers...
WGR614v6 Reference Manual
Page 125
...in range. 3. The station listens for the 54 Mbps Wireless Router WGR614 v6 • Shared Key. The station sends an association request to the access point. 5. The station can now communicate with an Ethernet network through the access point. Open System Authentication The following events must ... that govern how two 802.11 devices communicate. Wireless Networking Basics D-3 202-10099-01, April 2005 Turn on the wireless station. 2. The access point authenticates the station. 6. Reference Manual for messages from an access point that has a matching SSID. 4. With Shared Key...
...in range. 3. The station listens for the 54 Mbps Wireless Router WGR614 v6 • Shared Key. The station sends an association request to the access point. 5. The station can now communicate with an Ethernet network through the access point. Open System Authentication The following events must ... that govern how two 802.11 devices communicate. Wireless Networking Basics D-3 202-10099-01, April 2005 Turn on the wireless station. 2. The access point authenticates the station. 6. Reference Manual for messages from an access point that has a matching SSID. 4. With Shared Key...
WGR614v6 Reference Manual
Page 126
... station do not share the same WEP Key), then the access point will refuse to authenticate the station and the station will be unable to the access point. 4. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 2. The station associates with the access point and joins the network. The access point sends challenge text to the network. If the decrypted text...
... station do not share the same WEP Key), then the access point will refuse to authenticate the station and the station will be unable to the access point. 4. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 2. The station associates with the access point and joins the network. The access point sends challenge text to the network. If the decrypted text...
WGR614v6 Reference Manual
Page 127
... for the 54 Mbps Wireless Router WGR614 v6 This process is illustrated below. 802.11b Authentication Shared Key Steps 1) Authentication request sent to AP 2) AP sends challenge text Client 3) Client encrypts attempting challenge text and to connect sends it back to AP Access Point Cable/DSL ... data using the same WEP Key. Note: Some 802.11 access points also support Use WEP for 802.11 products: 1. Wireless Networking Basics D-5 202-10099-01, April 2005 For authentication purposes, the wireless network uses Shared Key Authentication. Typically, there are three WEP ...
... for the 54 Mbps Wireless Router WGR614 v6 This process is illustrated below. 802.11b Authentication Shared Key Steps 1) Authentication request sent to AP 2) AP sends challenge text Client 3) Client encrypts attempting challenge text and to connect sends it back to AP Access Point Cable/DSL ... data using the same WEP Key. Note: Some 802.11 access points also support Use WEP for 802.11 products: 1. Wireless Networking Basics D-5 202-10099-01, April 2005 For authentication purposes, the wireless network uses Shared Key Authentication. Typically, there are three WEP ...
WGR614v6 Reference Manual
Page 128
... Digits 64-bit (24+40) 10 128-bit (24+104) 26 Example of Hexadecimal Key Content 4C72F08AE1 4C72F08AE19D57A3FF6B260037 Note: Typically, 802.11 access points can only store one 128-bit key. When configured for 128-bit encryption, 802.11 products typically support four WEP Keys but 128-bit ...is a 40-bit WEP Key. Some vendors allow passphrases to be used to generate a 64-bit encryption key. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Key Size The IEEE 802.11 standard supports two types of 104 user-configurable bits. The 24 factory-set bits are added to...
... Digits 64-bit (24+40) 10 128-bit (24+104) 26 Example of Hexadecimal Key Content 4C72F08AE1 4C72F08AE19D57A3FF6B260037 Note: Typically, 802.11 access points can only store one 128-bit key. When configured for 128-bit encryption, 802.11 products typically support four WEP Keys but 128-bit ...is a 40-bit WEP Key. Some vendors allow passphrases to be used to generate a 64-bit encryption key. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Key Size The IEEE 802.11 standard supports two types of 104 user-configurable bits. The 24 factory-set bits are added to...
WGR614v6 Reference Manual
Page 129
Reference Manual for the 54 Mbps Wireless Router WGR614 v6 WEP Configuration Options The WEP settings must also enter the same keys for the client adapter in the same order. The radio frequency ..., and so on. Note: Whatever keys you enter for example, channel 1 and channel 2) in the ISM (Industrial, Scientific, and Medical) band between access points, then all of the 802.11 access points and all 802.11 devices that allow the maximum channel separation will decrease the amount of the signals, a node sending signals using...
Reference Manual for the 54 Mbps Wireless Router WGR614 v6 WEP Configuration Options The WEP settings must also enter the same keys for the client adapter in the same order. The radio frequency ..., and so on. Note: Whatever keys you enter for example, channel 1 and channel 2) in the ISM (Industrial, Scientific, and Medical) band between access points, then all of the 802.11 access points and all 802.11 devices that allow the maximum channel separation will decrease the amount of the signals, a node sending signals using...
WGR614v6 Reference Manual
Page 131
.... Through these enhancements, TKIP addresses most of 2003, all access points and client wireless adapters on a particular wireless LAN must use the same encryption key. Starting August of ...now performing interoperability certification testing on Wi-Fi Protected Access products. Wireless Networking Basics D-9 202-10099-01, April 2005 NETGEAR is required in 2004. TKIP provides important data...algorithm, but that the keys are cumbersome to change. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 WPA and WPA2 offer the following benefits: • Enhanced data privacy...
.... Through these enhancements, TKIP addresses most of 2003, all access points and client wireless adapters on a particular wireless LAN must use the same encryption key. Starting August of ...now performing interoperability certification testing on Wi-Fi Protected Access products. Wireless Networking Basics D-9 202-10099-01, April 2005 NETGEAR is required in 2004. TKIP provides important data...algorithm, but that the keys are cumbersome to change. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 WPA and WPA2 offer the following benefits: • Enhanced data privacy...
WGR614v6 Reference Manual
Page 132
...(TKIP) - This infrastructure includes stations, access points, and authentication servers (typically RADIUS servers). The RADIUS server holds (or has access to) user credentials (for example, user names and passwords) and authenticates wireless users before they gain access to implement. The strength of WPA/WPA2... WPA is communicated through WPA information elements in the enterprise. D-10 202-10099-01, April 2005 Wireless Networking Basics Reference Manual for the 54 Mbps Wireless Router WGR614 v6 How Does WPA Compare to allow a migration strategy, but mixing WEP and WPA/WPA2 is...
...(TKIP) - This infrastructure includes stations, access points, and authentication servers (typically RADIUS servers). The RADIUS server holds (or has access to) user credentials (for example, user names and passwords) and authenticates wireless users before they gain access to implement. The strength of WPA/WPA2... WPA is communicated through WPA information elements in the enterprise. D-10 202-10099-01, April 2005 Wireless Networking Basics Reference Manual for the 54 Mbps Wireless Router WGR614 v6 How Does WPA Compare to allow a migration strategy, but mixing WEP and WPA/WPA2 is...
WGR614v6 Reference Manual
Page 133
... Standard). We talk more about TKIP and AES when addressing data privacy below. • Authentication. For example, if the access point is an authentication method that integrates the authentication and data privacy functions. WPA/WPA2 features a robust key generation/management system that... and Access Point (AP). • Data Privacy (Encryption). Rather, the supplicant must use . TKIP includes a message integrity code (MIC) at the end of each plaintext message to overcome most of its weaknesses. • Data integrity. Reference Manual for the 54 Mbps Wireless Router WGR614 v6...
... Standard). We talk more about TKIP and AES when addressing data privacy below. • Authentication. For example, if the access point is an authentication method that integrates the authentication and data privacy functions. WPA/WPA2 features a robust key generation/management system that... and Access Point (AP). • Data Privacy (Encryption). Rather, the supplicant must use . TKIP includes a message integrity code (MIC) at the end of each plaintext message to overcome most of its weaknesses. • Data integrity. Reference Manual for the 54 Mbps Wireless Router WGR614 v6...
WGR614v6 Reference Manual
Page 134
...the use of a pre-shared key. D-12 202-10099-01, April 2005 Wireless Networking Basics Note: For environments with Optional 802.1x Port Based Network Access Control TCP/IP Ports Closed Until Authenticated TCP/IP Ports Opened After Authenticated RADIUS ...and several NETGEAR switch and wireless access point products support 802.1x. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 WPA/WPA2 Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS Wireless LAN WPA/WPA2 enabled wireless client with "supplicant" WPA/WPA2 enabled Access Point using ...
...the use of a pre-shared key. D-12 202-10099-01, April 2005 Wireless Networking Basics Note: For environments with Optional 802.1x Port Based Network Access Control TCP/IP Ports Closed Until Authenticated TCP/IP Ports Opened After Authenticated RADIUS ...and several NETGEAR switch and wireless access point products support 802.1x. Reference Manual for the 54 Mbps Wireless Router WGR614 v6 WPA/WPA2 Authentication: Enterprise-level User Authentication via 802.1x/EAP and RADIUS Wireless LAN WPA/WPA2 enabled wireless client with "supplicant" WPA/WPA2 enabled Access Point using ...
WGR614v6 Reference Manual
Page 135
This begins a series of message exchanges to connect with an authenticator (802.11 access point). Wireless Networking Basics 202-10099-01, April 2005 D-13 The access point replies with an EAP-request identity message. The client sends an EAP-start message. ...authentication method (802.1x or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Client with a WPA/ WPA2-enabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse) For example, a WPA/WPA2-enabled AP For example, a RADIUS server 1 2...
This begins a series of message exchanges to connect with an authenticator (802.11 access point). Wireless Networking Basics 202-10099-01, April 2005 D-13 The access point replies with an EAP-request identity message. The client sends an EAP-start message. ...authentication method (802.1x or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES). Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Client with a WPA/ WPA2-enabled wireless adapter and supplicant (Win XP, Funk, Meetinghouse) For example, a WPA/WPA2-enabled AP For example, a RADIUS server 1 2...
WGR614v6 Reference Manual
Page 136
... (Smart Cards), Kerberos, one-time passwords, certificates, and public key authentication, or as HTTP, DHCP, and POP3 packets, until the access point can automatically change the global encryption key used for the 54 Mbps Wireless Router WGR614 v6 3. The important part to verify the client's identity. Additionally, 802.11 and 802.1x provide no mechanism to...
... (Smart Cards), Kerberos, one-time passwords, certificates, and public key authentication, or as HTTP, DHCP, and POP3 packets, until the access point can automatically change the global encryption key used for the 54 Mbps Wireless Router WGR614 v6 3. The important part to verify the client's identity. Additionally, 802.11 and 802.1x provide no mechanism to...
WGR614v6 Reference Manual
Page 137
Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Temporal Key Integrity Protocol (TKIP) WPA uses TKIP ... be required initially for each preshared key authentication. A new frame counter in both the station and the access point. With WPA, a method known as the optimal choice for WPA2 One of the NIC's hardware in ...a pragmatic compromise that calculates an 8-byte message integrity check (MIC) using the calculation facilities available on existing wireless devices. TKIP also provides for the following: • The verification of the security configuration after the encryption...
Reference Manual for the 54 Mbps Wireless Router WGR614 v6 Temporal Key Integrity Protocol (TKIP) WPA uses TKIP ... be required initially for each preshared key authentication. A new frame counter in both the station and the access point. With WPA, a method known as the optimal choice for WPA2 One of the NIC's hardware in ...a pragmatic compromise that calculates an 8-byte message integrity check (MIC) using the calculation facilities available on existing wireless devices. TKIP also provides for the following: • The verification of the security configuration after the encryption...
WGR614v6 Reference Manual
Page 138
...users to the WPA clients, such as a result, the access point employs counter measures, which clients use WEP and which include disassociating each other benefits to lose network connectivity for the 54 Mbps Wireless Router WGR614 v6 Is WPA/WPA2 Perfect? WPA/WPA2 requires software ...step forward in August, 2003, NETGEAR, Inc. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it . wireless products that no better than anything else, this mode of each station using the access point. All other , then the network...
...users to the WPA clients, such as a result, the access point employs counter measures, which clients use WEP and which include disassociating each other benefits to lose network connectivity for the 54 Mbps Wireless Router WGR614 v6 Is WPA/WPA2 Perfect? WPA/WPA2 requires software ...step forward in August, 2003, NETGEAR, Inc. This prevents an attacker from gleaning information about the encryption key and alerts administrators, but it . wireless products that no better than anything else, this mode of each station using the access point. All other , then the network...
WGR614v6 Reference Manual
Page 139
... the 54 Mbps Wireless Router WGR614 v6 Changes to Wireless Access Points Wireless access points must have their support of WPA/WPA2, wireless APs send the beacon frame with a new 802.11 WPA/WPA2 information element that contains the wireless AP's security configuration (encryption algorithms and wireless security ...preshared key). • TKIP • Michael • AES (WPA2) To upgrade your wireless access points to the Wireless Zero Configuration service. For Windows wireless clients, you must be able to pass the adapter's WPA capabilities and security configuration to support...
... the 54 Mbps Wireless Router WGR614 v6 Changes to Wireless Access Points Wireless access points must have their support of WPA/WPA2, wireless APs send the beacon frame with a new 802.11 WPA/WPA2 information element that contains the wireless AP's security configuration (encryption algorithms and wireless security ...preshared key). • TKIP • Michael • AES (WPA2) To upgrade your wireless access points to the Wireless Zero Configuration service. For Windows wireless clients, you must be able to pass the adapter's WPA capabilities and security configuration to support...