User's Manual
Table Of Contents
- Reference Manual for the 54 Mbps Wall-Plugged Router WGX102
- Contents
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Connecting the Router to the Internet
- Prepare to Install Your Wireless Router
- First, Connect a Wall-Plugged Ethernet Bridge XE102
- Connect the Wireless Router to the Internet
- Now, Set Up a Computer for Wireless Connectivity
- Troubleshooting Tips
- Overview of How to Access the Wireless Router
- How to Manually Configure Your Internet Connection
- Using the Smart Setup Wizard
- NETGEAR Product Registration, Support, and Documentation
- Chapter 4 Wireless Configuration
- Chapter 5 Content Filtering
- Chapter 6 Maintenance
- Chapter 7 Advanced Configuration of the Router
- Chapter 8 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- What You Need To Use a Router with a Broadband Modem
- Preparing Your Computers for TCP/IP Networking
- Configuring Windows 95, 98, and Me for TCP/IP Networking
- Configuring Windows NT4, 2000 or XP for IP Networking
- Configuring the Macintosh for TCP/IP Networking
- Verifying the Readiness of Your Internet Account
- Restarting the Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
Reference Manual for the 54 Mbps Wall-Plugged Router WGX102
D-6 Wireless Networking Basics
July 2004 202-10036-01
WEP Shared Key Authentication
This process is illustrated in below.
Figure D-2: 802.11 shared key authentication
The following steps occur when two devices use Shared Key Authentication:
1. The station sends an authentication request to the access point.
2. The access point sends challenge text to the station.
3. The station uses its configured 64-bit or 128-bit default key to encrypt the challenge text, and
sends the encrypted text to the access point.
4. The access point decrypts the encrypted text using its configured WEP Key that corresponds
to the station’s default key. The access point compares the decrypted text with the original
challenge text. If the decrypted text matches the original challenge text, then the access point
and the station share the same WEP Key and the access point authenticates the station.
5. The station connects to the network.
If the decrypted text does not match the original challenge text (i.e., the access point and station do
not share the same WEP Key), then the access point will refuse to authenticate the station and the
station will be unable to communicate with either the 802.11 network or Ethernet network.