User Manual
Table Of Contents
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- About the NETGEAR ProSafe 802.11g Wireless Access Point WG302
- Key Features
- AutoCell-The Self-Organizing Wireless Network
- 802.11g Standards-based Wireless Networking
- Autosensing Ethernet Connections with Auto Uplink
- Compatible and Related NETGEAR Products
- System Requirements
- What’s In the Box?
- Hardware Description
- Front Panel
- Rear Panel
- Chapter 3 Basic Installation and Configuration
- Wireless Equipment Placement and Range Guidelines
- Cabling Requirements
- Default Factory Settings
- Understanding WG302 Wireless Security Options
- Installing the WG302 Wireless Access Point
- Logging in to the WG302 Using Its Default IP Address
- Basic IP Settings
- Wireless Settings
- Security Profiles
- Before You Change the SSID and WEP Settings
- Setting up and Testing Basic Wireless Connectivity
- Configuring the Radius Server Settings
- Configuring Network Authentication
- Entering WEP Data Encryption Keys
- Restricting Wireless Access by MAC Address
- Chapter 4 Management
- Remote Management
- Using the Secure Telnet Interface
- How to Use the CLI via the Console Port
- CLI Commands
- SNMP Remote Management
- Viewing the Activity Log
- Viewing General Information
- Viewing Statistics
- Viewing the Available Wireless Station List
- Upgrading the Wireless Access Point Firmware
- Configuration File Management
- Backing up and Restoring the Configuration
- Erasing the Configuration
- Using the Reset Button to Restore Factory Default Settings
- Changing the Administrator Password
- AutoCell Rogue AP Detection
- AutoCell Rogue Station Detection
- Chapter 5 Advanced Configuration
- Understanding Advanced IP Settings for Wireless Clients
- Configuring Advanced Wireless LAN Settings
- AutoCell Overview
- AutoCell Configuration Options
- Auto RF Management
- Wi-Fi Multimedia (WMM) Setup
- Hotspot Settings
- Configuring Wireless LAN Parameters
- Wireless Bridging and Repeating
- Point-to-Point Bridge Configuration
- Multi-Point Bridge Configuration
- Repeater with Wireless Client Association
- Configuring NAT
- Configuring QoS Queues
- Setting up Guest Access
- Chapter 6 Troubleshooting
- No lights are lit on the access point.
- The Wireless LAN activity light does not light up.
- The LAN light is not lit.
- I cannot access the Internet or the LAN with a wireless capable computer.
- I cannot connect to the WG302 to configure it.
- When I enter a URL or IP address I get a timeout error.
- Using the Reset Button to Restore Factory Default Settings
- Appendix B Wireless Networking Basics
- Wireless Networking Overview
- Infrastructure Mode
- Ad Hoc Mode (Peer-to-Peer Workgroup)
- Network Name: Extended Service Set Identification (ESSID)
- Authentication and WEP Data Encryption
- 802.11 Authentication
- Open System Authentication
- Shared Key Authentication
- Overview of WEP Parameters
- Key Size
- WEP Configuration Options
- Wireless Channels
- WPA and WPA2 Wireless Security
- How Does WPA Compare to WEP?
- How Does WPA Compare to WPA2 (IEEE 802.11i)?
- What are the Key Features of WPA and WPA2 Security?
- Is WPA/WPA2 Perfect?
- Product Support for WPA/WPA2
- Appendix C Command Line Reference
Reference Manual for the NETGEAR ProSafe 802.11g Wireless Access Point WG302
B-6 Wireless Networking Basics
v0.1, December 2005
Key Size
The IEEE 802.11 standard supports two types of WEP encryption: 40-bit and 128-bit.
The 64-bit WEP data encryption method allows for a five-character (40-bit) input. Additionally, 24
factory-set bits are added to the forty-bit input to generate a 64-bit encryption key. The 24
factory-set bits are not user-configurable). This encryption key will be used to encrypt/decrypt all
data transmitted via the wireless interface. Some vendors refer to the 64-bit WEP data encryption
as 40-bit WEP data encryption since the user-configurable portion of the encryption key is 40 bits
wide.
The 128-bit WEP data encryption method consists of 104 user-configurable bits. Similar to the
forty-bit WEP data encryption method, the remaining 24 bits are factory set and not user
configurable. Some vendors allow passphrases to be entered instead of the cryptic hexadecimal
characters to ease encryption key entry.
128-bit encryption is stronger than 40-bit encryption, but 128-bit encryption may not be available
outside of the United States due to U.S. export regulations.
When configured for 40-bit encryption, 802.11 products typically support up to four WEP Keys.
Each 40-bit WEP Key is expressed as 5 sets of two hexadecimal digits (0-9 and A-F). For
example, “12 34 56 78 90” is a 40-bit WEP Key.
When configured for 128-bit encryption, 802.11 products typically support four WEP Keys but
some manufacturers support only one 128-bit key. The 128-bit WEP Key is expressed as 13 sets of
two hexadecimal digits (0-9 and A-F). For example, “12 34 56 78 90 AB CD EF 12 34 56 78 90”
is a 128-bit WEP Key.
Table 8-1: Encryption Key Sizes
Note: Typically, 802.11 access points can store up to four 128-bit WEP Keys but some 802.11
client adapters can only store one. Therefore, make sure that your 802.11 access and client
adapters’ configurations match.
WEP Configuration Options
The WEP settings must match on all 802.11 devices that are within the same wireless network as
identified by the SSID. In general, if your mobile clients will roam between access points, then all
of the 802.11 access points and all of the 802.11 client adapters on the network must have the same
WEP settings.
Encryption Key Size # of Hexadecimal Digits Example of Hexadecimal Key Content
64-bit (24+40) 10 4C72F08AE1
128-bit (24+104) 26 4C72F08AE19D57A3FF6B260037