background image

4.7 IEEE 802.11 WEP Security

The IEEE 802.11 standard includes a Shared Key data privacy mechanism,
called ‘Wired Equivalent Privacy’.

Features of WEP are:

 Data encryption using a 40 bit shared key

 No key distribution mechanism. The shared key (password) must be

distributed manually to all personnel and either be remembered or stored
somewhere on the hard disk.

 Simple authentication of clients based on hardware address.

4.8 AirLock™ Security Architecture

The No Wires Needed AirLock™ Security architecture provides superior
protection of your data combined with improved ease of use through secure
automated key management, while maintaining full compatibility with the IEEE
802.11 standard.

Some features of AirLock™ Security are:

 Data encryption using 128 bit random session keys

 Key management using a public / private key scheme. Keys are never

transmitted as plain text

 Strong authentication of the client stations based on challenge /

response.

 Automatic scale back function (ASBF™) maintains compliance to IEEE

802.11 shared key security for client stations that do not support
AirLock™ Security.

4.9 More about Cells

Each Access Point in the network forms the centre of a cell, or BSS. The Cells
should overlap slightly to guarantee seamless wireless connectivity
everywhere. Nearby Access Points should preferably send and receive on
different channels for maximum throughput.
Creating a cell plan for your site can be complicated, and is usually done by
experts employing special measuring equipment.
Furthermore, the radio channels you may use depend on both the capabilities
of the PC-Cards you are deploying, as well as the regulations in your area.

Summary of Contents for Parrot 1100

Page 1: ...No Wires Needed Parrot 1100 Access Point User Manual Version 2 1 0 July 1999...

Page 2: ......

Page 3: ...User manual Parrot 1100 Access Point No Wires Needed Jan Steenlaan 3 5 3723 BS Bilthoven The Netherlands www nwn com Version 2 1 0 July 1999...

Page 4: ...ot Pelican AirLock APCenter ASBF and Connect are trademarks of No Wires Needed Other product and company names are registered trademarks or trademarks of their respective holders Copyright statement N...

Page 5: ...le damage Excluded from the warranty are malfunctions caused by operation outside the intended usage by misuse or abuse by service modifications or repairs performed by unauthorised persons or by othe...

Page 6: ...Statement of Year 2000 Compliance Detailed information about our statement is published on our website http www nwn com...

Page 7: ...etached antennas whether installed indoors or out should be installed ONLY by experienced antenna installation professionals who are familiar with local building and safety codes and wherever applicab...

Page 8: ...oints 20 4 4 3 Manually programming IP addresses 21 4 5 Managing Security 22 4 5 1 Access Control 23 4 6 Updating Access Point Settings 25 4 7 IEEE 802 11 WEP Security 26 4 8 AirLock Security Architec...

Page 9: ...ter Software Note if anything is missing please contact your vendor A wireless LAN is normally used in a predefined environment In such a network Access Points are mounted at assigned places each cove...

Page 10: ...ey A drill model is supplied as a separate sheet with this manual 2 Make sure the antennas are in a vertical position if not rotate over 90 degrees 3 Insert the power connector 4 Attach the UTP Ethern...

Page 11: ...le network is detected the network LED will turn red When the supplied power is too low or unstable the power LED will turn red The power LED will also turn red when the firmware of the Access Point h...

Page 12: ...ving Access Points Restricting access to the Wireless network Managing data protection options such as IEEE 802 11 WEP and AirLock Security Assigning radio channels for optimal cell management Groupin...

Page 13: ...o Quick Start to Wireless Networking The tree structure on the left of the window shows a list of WLANs Wireless LANs and the Access Points that are part of each WLAN The sample image above shows a si...

Page 14: ...Client stations can roam freely over Access Points that have the same ESSID Therefore the security options for all Access Points with the same ESSID are identical Security options can be managed thro...

Page 15: ...to reflect your situation Use the Edit Network Settings menu item See the section Network Settings Dialog for details 4 Create at least one WLAN Edit Insert Wireless LAN and select the desired securi...

Page 16: ...another by dragging it with the mouse or by selecting Edit Cut followed by Edit Paste There are two WLANs that have a special meaning in APCenter These are the Unused Access Points and Disabled Acces...

Page 17: ...ss Point to the Disabled special WLAN by pressing Delete or selecting the Edit Clear menu item Access Points in this special WLAN will not be accessible for any client station See Managing WLANs The A...

Page 18: ...ory domain for which the Access Point has been configured factory setting Note that it is illegal to use the Access Point outside the designated domain See Regulatory Domains for details The IP addres...

Page 19: ...rmation in the Network address mask and default gateway fields in the dialog and clicking the Set button for each network subnet To view the details of a particular network click on the Address field...

Page 20: ...is no longer valid or known possibly because the DHCP or BOOTP server has assigned it a different IP address You may be informed of this fact because the Access Points will be reported off line by APC...

Page 21: ...cess Points on The network LED should light up in red 4 Configure the network you want your Access Points to be part of See Network Settings Dialog for details 5 Enter the hardware addresses of the Ac...

Page 22: ...802 11 WEP based on a 40 bit shared key and No Wires Needed AirLock based on automatically generated 128 bit session keys Access Control The IEEE 802 11 standard allows for Access Control rules based...

Page 23: ...ock may still communicate with the Access Points through the ASBF mechanism In some situations it may be advisable to enforce AirLock as the only available mechanism See the section Access Control for...

Page 24: ...o enter the client stations you want to grant access A default rule determines whether unregistered stations can join You can move clients between Access Granted and Access Denied lists by clicking th...

Page 25: ...toolbar button During the update the following Dialog is displayed Access Point that is currently being processed Progress indicator Update result counters The Skipped count refers to Access Points in...

Page 26: ...are Data encryption using 128 bit random session keys Key management using a public private key scheme Keys are never transmitted as plain text Strong authentication of the client stations based on c...

Page 27: ...defined channels FCC United States 1 11 1 6 11 DOC Canada 1 11 1 6 11 ETSI Europe except Spain and France 1 13 1 7 13 SPAIN Spain 10 10 FRANCE France 10 10 MKK Japan 14 14 4 10 Compatibility The APCen...

Page 28: ...ith identical settings among which a client system can roam An ESS forms the heart of a WLAN No Wires Needed BV http www nwn com Parrot 1100 Access Point 11 5 5 2 0 1 0 Mbps IEEE 802 11 Access Point b...

Page 29: ...826 CE marked IEEE 802 11 standard for Wireless LAN All major networking standards including IP IPX 6 2 Environmental Operating temperature ambient 0 C to 40 C 32 F to 104 F Humidity 95 6 3 Power spe...

Page 30: ...overlapping France 4 1 non overlapping Antenna system Dual antenna diversity system 2dB gain 6 5 Specific features Supported bit rates 11 Mbps 5 5 Mbps 1 Mbps IEEE 802 11 DSSS compliant devices using...

Page 31: ......

Page 32: ......

Reviews: