User's Manual
Table Of Contents
- User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U
- Technical Support
- Statement of Conditions
- FCC Information to User
- Regulatory Compliance Information
- Export Restrictions
- Europe - EU Declaration of Conformity
- Requirements For Operation in the European Community
- Canadian Department of Communications Radio Interference Regulations
- Chapter 1 About This Manual
- Chapter 2 Introduction
- Chapter 3 Basic Setup
- Chapter 4 Configuration
- Chapter 5 Wireless Security Configuration
- Chapter 6 Troubleshooting
- Basic Tips
- Frequently Asked Questions
- General Questions
- Why do I see no more than 54 Mbps on the Configuration Utility status line?
- The WG111U Smart Configuration Utility keeps asking me to save my settings
- Ad Hoc mode is not working correctly
- How to know if the WG111U card has received a valid IP address
- How to use XP’s own Wireless configuration utility
- I cannot connect to the AP that I want from the Networks browser list
- New Hardware Wizard appears after installation has completed
- How to get a PDF copy of the Manual
- General Questions
- Appendix A Technical Specifications
- Appendix B Wireless Networking Basics
- What You Need To Use a Router with a Broadband Modem
- Preparing Your Computers for TCP/IP Networking
- Configuring Windows 95, 98, and Me for TCP/IP Networking
- Configuring Windows NT4, 2000 or XP for IP Networking
- Configuring the Macintosh for TCP/IP Networking
- Verifying the Readiness of Your Internet Account
- Restarting the Network
- Glossary
- Index
User’s Manual for the NETGEAR Super AG Wireless USB 2.0 Adapter WG111U
B-16 Wireless Networking Basics
202-10065-01
Is WPA Perfect?
WPA is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS)
attacks. If the access point receives two data packets that fail the Message Integrity Code (MIC)
check within 60 seconds of each other then the network is under an active attack, and as a result,
the access point employs counter measures, which includes disassociating each station using the
access point. This prevents an attacker from gleaning information about the encryption key and
alerts administrators, but it also causes users to lose network connectivity for 60 seconds. More
than anything else, this may just prove that no single security tactic is completely invulnerable.
WPA is a definite step forward in WLAN security over WEP and has to be thought of as a single
part of an end-to-end network security strategy.
Product Support for WPA
Starting in August, 2003, NETGEAR, Inc. wireless Wi-Fi certified products will support the WPA
standard. NETGEAR, Inc. wireless products that had their Wi-Fi certification approved before
August, 2003 will have one year to add WPA so as to maintain their Wi-Fi certification.
WPA requires software changes to the following:
• Wireless access points
• Wireless network adapters
• Wireless client programs
Supporting a Mixture of WPA and WEP Wireless Clients
To support the gradual transition of WEP-based wireless networks to WPA, a wireless AP can
support both WEP and WPA clients at the same time. During the association, the wireless AP
determines which clients use WEP and which clients use WPA. The disadvantage to supporting a
mixture of WEP and WPA clients is that the global encryption key is not dynamic. This is because
WEP-based clients cannot support it. All other benefits to the WPA clients, such as integrity, are
maintained.
However, a mixed mode supporting WPA and non-WPA clients would offer network security that
is no better than that obtained with a non-WPA network, and thus this mode of operation is
discouraged.
Changes to Wireless Access Points
Wireless access points must have their firmware updated to support the following: