Contents v
202-10060-02, February 2005
When I enter a URL or IP address I get a timeout error. ..........................................6-3
Using the Reset Button to Restore Factory Default Settings ..........................................6-3
Appendix A
Specifications
Specifications for the WG602v3 .................................................................................... A-1
Appendix B
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... B-1
Infrastructure Mode ................................................................................................. B-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ B-2
Network Name: Extended Service Set Identification (ESSID) ................................ B-2
Authentication and WEP Data Encryption ..................................................................... B-2
802.11 Authentication .............................................................................................. B-3
Open System Authentication ................................................................................... B-3
Shared Key Authentication ...................................................................................... B-4
Overview of WEP Parameters ................................................................................ B-5
Key Size .................................................................................................................. B-6
WEP Configuration Options .................................................................................... B-7
Wireless Channels ......................................................................................................... B-7
WPA and WPA2 Wireless Security ................................................................................ B-8
How Does WPA Compare to WEP? ........................................................................ B-9
How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................ B-10
What are the Key Features of WPA and WPA2 Security? .................................... B-10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. B-12
WPA/WPA2 Data Encryption Key Management ............................................. B-14
Is WPA/WPA2 Perfect? ......................................................................................... B-16
Product Support for WPA/WPA2 ........................................................................... B-16
Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged B-16
Changes to Wireless Access Points ............................................................... B-17
Changes to Wireless Network Adapters ......................................................... B-17
Changes to Wireless Client Programs ............................................................ B-18
Appendix C
Network, Routing, Firewall, and Cabling Basics
Basic Router Concepts .................................................................................................. B-1
What is a Router? ................................................................................................... B-1