background image

Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302

14

Glossary

July 2005 v3.0

does not offer. With this feature, WPA provides roughly comparable security to VPN tunneling with WEP, 
with the benefit of easier administration and use. This is similar to 802.1x support and requires a RADIUS 
server in order to implement. The Wi-Fi Alliance will call this, 'WPA-Enterprise.' 

One variation of WPA is called WPA Pre Shared Key or WPA-PSK for short - this provides an 
authentication alternative to an expensive RADIUS server. WPA-PSK is a simplified but still powerful form 
of WPA most suitable for home Wi-Fi networking. To use WPA-PSK, a person sets a static key or 
"passphrase" as with WEP. But, using TKIP, WPA-PSK automatically changes the keys at a preset time 
interval, making it much more difficult for hackers to find and exploit them. The Wi-Fi Alliance will call 
this, 'WPA-Personal.' 

Wi-Fi Protected Access and IEEE 802.11i Comparison 

Wi-Fi Protected Access will be forward-compatible with the IEEE 802.11i security specification currently 
under development by the IEEE. Wi-Fi Protected Access is a subset of the current 802.11i draft, taking 
certain pieces of the 802.11i draft that are ready to bring to market today, such as its implementation of 
802.1x and TKIP. These features can also be enabled on most existing Wi-Fi CERTIFIED products as a 
software upgrade. The main pieces of the 802.11i draft that are not included in Wi-Fi Protected Access are 
secure IBSS, secure fast handoff, secure de-authentication and disassociation, as well as enhanced 
encryption protocols such as AES-CCMP. These features are either not yet ready for market or will require 
hardware upgrades to implement. 

Wi-Fi Protected Access for the Enterprise 

Wi-Fi Protected Access effectively addresses the WLAN security requirements for the enterprise and 
provides a strong encryption and authentication solution prior to the ratification of the IEEE 802.11i 
standard. In an enterprise with IT resources, Wi-Fi Protected Access should be used in conjunction with an 
authentication server such as RADIUS to provide centralized access control and management. With this 
implementation in place, the need for add-on solutions such as VPNs may be eliminated, at least for the 
express purpose of securing the wireless link in a network. 

Wi-Fi Protected Access for Home/SOHO 

In a home or Small Office/ Home Office (SOHO) environment, where there are no central authentication 
servers or EAP framework, Wi-Fi Protected Access runs in a special home mode. This mode, also called 
Pre-Shared Key (PSK), allows the use of manually-entered keys or passwords and is designed to be easy to 
set up for the home user. All the home user needs to do is enter a password (also called a master key) in their 
access point or home wireless gateway and each PC that is on the Wi-Fi wireless network. Wi-Fi Protected 
Access takes over automatically from that point. First, the password allows only devices with a matching 
password to join the network, which keeps out eavesdroppers and other unauthorized users. Second, the 
password automatically kicks off the TKIP encryption process, described above. 

Wi-Fi Protected Access for Public Access 

The intrinsic encryption and authentication schemes defined in Wi-Fi Protected Access may also prove 
useful for Wireless Internet Service Providers (WISPs) offering Wi-Fi public access in "hot spots" where 

Содержание WG3002

Страница 1: ...LANs and pertains to systems operating in the 5 GHz frequency range with a bandwidth of 54 Mbps Another standard 802 11g is for WLANS operating in the 2 4 GHz frequency but with a bandwidth of 54 Mbp...

Страница 2: ...defines software patches to WEP to provide a minimally adequate level of data privacy AES or AES OCB Advanced Encryption Standard and Offset Codebook is a robust data privacy scheme and is a longer te...

Страница 3: ...capabilities such as NAT routing DHCP firewalls security etc Ad Hoc mode A client setting that provides independent peer to peer connectivity in a wireless LAN An alternative set up is one where PCs...

Страница 4: ...wireless gateway or access point Instead of the signals transferring in parallel paths from one set of plugs to another the signals crossover If an eight wire cable was being used for instance the sig...

Страница 5: ...eries of numbers like 107 22 55 26 Every website has its own specific IP address on the Internet Encryption Key An alphanumeric letters and or numbers series that enables data to be encrypted and then...

Страница 6: ...may also provide VPN support roaming firewalls various levels of security etc Hot Spot also referred to as Public Access Location A place where you can access Wi Fi service This can be for free or fo...

Страница 7: ...nt AP As compared to Ad Hoc mode whereby PCs communicate directly with each other clients set in Infrastructure Mode all pass data through a central AP The AP not only mediates wireless network traffi...

Страница 8: ...of the spheres below represent a mesh router Corporate servers and printers may be shared by attaching to each mesh router For wireless access to the mesh an access point must be attached to any one...

Страница 9: ...rver or central hub or router All the networked PCs are equally able to act as a network server or client and each client computer can talk to all the other wireless computers without having to go thr...

Страница 10: ...nd alone mode in a parking lot or in a neighbor s building Rogue APs by definition are not under the management of network administrators and do not conform to network security policies and may presen...

Страница 11: ...the server in order to have a secret key exchange for that session Subnetwork or Subnet Found in larger networks these smaller networks are used to simplify addressing between numerous computers Subn...

Страница 12: ...ndwidth of up to 400 Mbps VoIP Voice over IP Voice transmission using Internet Protocol to create digital packets distributed over the Internet VoIP can be less expensive than voice transmission using...

Страница 13: ...or small business user needs to protect wireless data WEP is available in 40 bit also called 64 bit or in 108 bit also called 128 bit encryption modes As 108 bit encryption provides a longer algorith...

Страница 14: ...S CCMP These features are either not yet ready for market or will require hardware upgrades to implement Wi Fi Protected Access for the Enterprise Wi Fi Protected Access effectively addresses the WLAN...

Страница 15: ...ess for all Wi Fi clients and access points WiMAX An IEEE 802 16 Task Group that provides a specification for fixed broadband wireless access systems employing a point to multipoint PMP architecture T...

Страница 16: ...Reference Manual for the NETGEAR ProSafe Wireless Access Point 802 11g WG302 16 Glossary July 2005 v3 0...

Отзывы: