Contents
xi
201-10301-02, May 2005
Restarting the Network
................................................................................................
C-12
Appendix D
Firewall Log Formats
Action List
......................................................................................................................
D-1
Field List
........................................................................................................................
D-1
Outbound Log
................................................................................................................
D-1
Inbound Log
...................................................................................................................
D-2
Other IP Traffic
..............................................................................................................
D-2
Router Operation
...........................................................................................................
D-3
Other Connections and Traffic to this Router
................................................................
D-4
DoS Attack/Scan
...........................................................................................................
D-4
Access Block Site
..........................................................................................................
D-6
All Web Sites and News Groups Visited
........................................................................
D-6
System Admin Sessions
................................................................................................
D-6
Policy Administration LOG
.............................................................................................
D-7
Appendix E
Wireless Networking Basics
Wireless Networking Overview
......................................................................................
E-1
Infrastructure Mode
.................................................................................................
E-1
Ad Hoc Mode (Peer-to-Peer Workgroup)
................................................................
E-2
Network Name: Extended Service Set Identification (ESSID)
................................
E-2
Authentication and WEP Data Encryption
.....................................................................
E-2
802.11 Authentication
..............................................................................................
E-3
Open System Authentication
...................................................................................
E-3
Shared Key Authentication
......................................................................................
E-4
Overview of WEP Parameters
................................................................................
E-5
Key Size
..................................................................................................................
E-6
WEP Configuration Options
....................................................................................
E-7
Wireless Channels
.........................................................................................................
E-7
WPA Wireless Security
..................................................................................................
E-8
How Does WPA Compare to WEP?
........................................................................
E-9
How Does WPA Compare to IEEE 802.11i?
........................................................
E-10
What are the Key Features of WPA Security?
......................................................
E-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
..................................................
E-12
WPA Data Encryption Key Management
........................................................
E-14