Page 116 / 122 Scroll up to view Page 111 - 115
Reference Manual for the Wireless Cable Modem Gateway CG814WG v2
D-16
Wireless Networking Basics
Is WPA Perfect?
WPA is not without its vulnerabilities. Specifically, it is susceptible to denial of service (DoS)
attacks. If the access point receives two data packets that fail the Message Integrity Code (MIC)
check within 60 seconds of each other then the network is under an active attack, and as a result,
the access point employs counter measures, which includes disassociating each station using the
access point. This prevents an attacker from gleaning information about the encryption key and
alerts administrators, but it also causes users to lose network connectivity for 60 seconds. More
than anything else, this may just prove that no single security tactic is completely invulnerable.
WPA is a definite step forward in WLAN security over WEP and has to be thought of as a single
part of an end-to-end network security strategy.
Product Support for WPA
Starting in August, 2003, NETGEAR, Inc. wireless Wi-Fi certified products will support the WPA
standard. NETGEAR, Inc. wireless products that had their Wi-Fi certification approved before
August, 2003 will have one year to add WPA so as to maintain their Wi-Fi certification.
WPA requires software changes to the following:
Wireless access points
Wireless network adapters
Wireless client programs
Supporting a Mixture of WPA and WEP Wireless Clients
To support the gradual transition of WEP-based wireless networks to WPA, a wireless AP can
support both WEP and WPA clients at the same time. During the association, the wireless AP
determines which clients use WEP and which clients use WPA. The disadvantage to supporting a
mixture of WEP and WPA clients is that the global encryption key is not dynamic. This is because
WEP-based clients cannot support it. All other benefits to the WPA clients, such as integrity, are
maintained.
However, a mixed mode supporting WPA and non-WPA clients would offer network security that
is no better than that obtained with a non-WPA network, and thus this mode of operation is
discouraged.
Changes to Wireless Access Points
Wireless access points must have their firmware updated to support the following:
Page 117 / 122
Reference Manual for the Wireless Cable Modem Gateway CG814WG v2
Wireless Networking Basics
D-17
The new WPA information element
To advertise their support of WPA, wireless APs send the beacon frame with a new 802.11
WPA information element that contains the wireless AP's security configuration (encryption
algorithms and wireless security configuration information).
The WPA two-phase authentication
Open system, then 802.1x (EAP with RADIUS or preshared key).
TKIP
Michael
AES
(optional)
To upgrade your wireless access points to support WPA, obtain a WPA firmware update from your
wireless AP vendor and upload it to your wireless AP.
Changes to Wireless Network Adapters
Wireless network adapters must have their firmware updated to support the following:
The new WPA information element
Wireless clients must be able to process the WPA information element and respond with a
specific security configuration.
The WPA two-phase authentication
Open system, then 802.1x (EAP or preshared key).
TKIP
Michael
AES
(optional)
To upgrade your wireless network adapters to support WPA, obtain a WPA update from your
wireless network adapter vendor and update the wireless network adapter driver.
For Windows wireless clients, you must obtain an updated network adapter driver that supports
WPA. For wireless network adapter drivers that are compatible with Windows XP (Service Pack 1)
and Windows Server 2003, the updated network adapter driver must be able to pass the adapter's
WPA capabilities and security configuration to the Wireless Zero Configuration service.
Microsoft has worked with many wireless vendors to embed the WPA firmware update in the
wireless adapter driver. So, to update you Windows wireless client, all you have to do is obtain the
new WPA-compatible driver and install the driver. The firmware is automatically updated when
the wireless network adapter driver is loaded in Windows.
Page 118 / 122
Reference Manual for the Wireless Cable Modem Gateway CG814WG v2
D-18
Wireless Networking Basics
Changes to Wireless Client Programs
Wireless client programs must be updated to permit the configuration of WPA authentication (and
preshared key) and the new WPA encryption algorithms (TKIP and the optional AES component).
To obtain the Microsoft WPA client program, visit the Microsoft Web site.
Page 119 / 122
Glossary
1
Glossary
10BASE-T
IEEE 802.3 specification for 10 Mbps Ethernet over twisted pair wiring.
100BASE-Tx
IEEE 802.3 specification for 100 Mbps Ethernet over twisted pair wiring.
802.11b
IEEE specification for wireless networking at 11 Mbps using direct-sequence
spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.5GHz.
802.11g
IEEE specification for wireless networking at 54Mbps using direct-sequence
spread-spectrum (DSSS) technology and operating in the unlicensed radio
spectrum at 2.5GHz.
Denial of Service
attack
DoS. A hacker attack designed to prevent your computer or network from
operating or communicating.
DHCP
See
Dynamic Host Configuration Protocol.
DNS
See
Domain Name Server.
Domain Name
A descriptive name for an address or group of addresses on the Internet.
Domain names are of the form of a registered entity name plus one of a
number of predefined top level suffixes such as .com, .edu, .uk, etc. For
example, in the address mail.NETGEAR.com, mail is a server name and
NETGEAR.com is the domain.
Domain Name Server
A Domain Name Server (DNS) resolves descriptive names of network
resources (such as www.NETGEAR.com) to numeric IP addresses.
DSLAM
DSL Access Multiplexor. The piece of equipment at the telephone company
central office that provides the ADSL signal.
Dynamic Host
Configuration
Protocol
DHCP. An Ethernet protocol specifying how a centralized DHCP server can
assign network configuration information to multiple DHCP clients. The
assigned information includes IP addresses, DNS addresses, and gateway
(router) addresses.
Gateway
A local device, usually a router, that connects hosts on a local network to other
networks.
IP
See
Internet Protocol.
Page 120 / 122
Reference Manual for the Model CG814WG v2 Wireless Cable Modem Gateway
2
Glossary
IP Address
A four-byte number uniquely defining each host on the Internet. Ranges of
addresses are assigned by Internic, an organization formed for this purpose.
Usually written in dotted-decimal notation with periods separating the bytes
(for example, 134.177.244.57).
IPSec
Internet Protocol Security. IPSec is a series of guidelines for securing private
information transmitted over public networks. IPSec is a VPN method
providing a higher level of security than PPTP.
ISP
Internet service provider.
Internet Protocol
The main internetworking protocol used in the Internet. Used in conjunction
with the Transfer Control Protocol (TCP) to form TCP/IP.
LAN
See
local area network.
local area network
LAN. A communications network serving users within a limited area, such as
one floor of a building. A LAN typically connects multiple personal
computers and shared network devices such as storage and printers. Although
many technologies exist to implement a LAN, Ethernet is the most common
for connecting personal computers.
MAC address
Media Access Control address. A unique 48-bit hardware address assigned to
every Ethernet node. Usually written in the form 01:23:45:67:89:ab.
Mbps
Megabits per second.
MSB
See
Most Significant Bit or Most Significant Byte.
MTU
See
Maximum Transmission Unit.
Maximum Transmit
Unit
The size in bytes of the largest packet that can be sent or received.
Most Significant Bit or
Most Significant Byte
The portion of a number, address, or field that is farthest left when written as a
single number in conventional hexadecimal ordinary notation. The part of the
number having the most value.
NAT
See
Network Address Translation.
Netmask
A number that explains which part of an IP address comprises the network
address and which part is the host address on that network. It can be
expressed in dotted-decimal notation or as a number appended to the IP
address. For example, a 28-bit mask starting from the MSB can be shown as
255.255.255.192 or as /28 appended to the IP address.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top