User's Manual
Table Of Contents
- User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U
- Technical Support
- Statement of Conditions
- FCC Information to User
- Regulatory Compliance Information
- Export Restrictions
- Europe - EU Declaration of Conformity
- Requirements For Operation in the European Community
- Canadian Department of Communications Radio Interference Regulations
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Basic Setup
- Chapter 4 Configuration
- Chapter 5 Wireless Security Configuration
- Chapter 6 Troubleshooting
- Basic Tips
- Frequently Asked Questions
- General Questions
- Why do I see no more than 54 Mbps on the Configuration Utility status line?
- The WG111U Smart Configuration Utility keeps asking me to save my settings
- Ad Hoc mode is not working correctly
- How to know if the WG111U card has received a valid IP address
- How to use XP’s own Wireless configuration utility
- I cannot connect to the AP that I want from the Networks browser list
- New Hardware Wizard appears after installation has completed
- How to get a PDF copy of the Manual
- General Questions
- Appendix A Technical Specifications
- Appendix B Wireless Networking Basics
- What You Need To Use a Router with a Broadband Modem
- Preparing Your Computers for TCP/IP Networking
- Configuring Windows 95, 98, and Me for TCP/IP Networking
- Configuring Windows NT4, 2000 or XP for IP Networking
- Configuring the Macintosh for TCP/IP Networking
- Verifying the Readiness of Your Internet Account
- Restarting the Network
- Glossary
- Index
User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U
B-10 Wireless Networking Basics
202-10065-01
How Does WPA Compare to IEEE 802.11i?
WPA is forward compatible with the IEEE 802.11i security specification currently under
development. WPA is a subset of the current 802.11i draft and uses certain pieces of the 802.11i
draft that were ready to bring to market in 2003, such as 802.1x and TKIP. The main pieces of the
802.11i draft that are not included in WPA are secure IBSS (Ad-Hoc mode), secure fast handoff
(for specialized 802.11 VoIP phones), as well as enhanced encryption protocols such as
AES-CCMP. These features are either not yet ready for market or will require hardware upgrades
to implement.
What are the Key Features of WPA Security?
The following security features are included in the WPA standard:
• WPA Authentication
• WPA Encryption Key Management
– Temporal Key Integrity Protocol (TKIP)
– Michael message integrity code
(MIC)
– AES Support
• Support for a Mixture of WPA and WEP Wireless Clients
These features are discussed below.
WPA addresses most of the known WEP vulnerabilities and is primarily intended for wireless
infrastructure networks as found in the enterprise. This infrastructure includes stations, access
points, and authentication servers (typically RADIUS servers). The RADIUS server holds (or has
access to) user credentials (e.g., user names and passwords) and authenticates wireless users
before they gain access to the network.
The strength WPA comes from an integrated sequence of operations that encompass 802.1X/EAP
authentication and sophisticated key management and encryption techniques. Its major operations
include:
• Network security capability determination. This occurs at the 802.11 level and is
communicated through WPA information elements in Beacon, Probe Response, and (Re)
Association Requests. Information in these elements includes the authentication method
(802.1X or Pre-shared key) and the preferred cipher suite (WEP, TKIP, or AES).