Netgear MA111v2 - 11 Mbps Wireless USB Adapter Manual De Usuario

Descargar
Página de 83
User Manual for the NETGEAR 11 Mbps Wireless USB Adapter MA111
B-8
Wireless Networking Basics
202-10032-01
WEP Configuration Options
The WEP settings must match on all 802.11 devices that are within the same wireless network as 
identified by the SSID. In general, if your mobile clients will roam between access points, then all 
of the 802.11 access points and all of the 802.11 client adapters on the network must have the same 
WEP settings. 
Note: Whatever keys you enter for an AP, you must also enter the same keys for the client adapter 
in the same order. In other words, WEP key 1 on the AP must match WEP key 1 on the client 
adapter, WEP key 2 on the AP must match WEP key 2 on the client adapter, etc.
Note: The AP and the client adapters can have different default WEP Keys as long as the keys are 
in the same order. In other words, the AP can use WEP key 2 as its default key to transmit while a 
client adapter can use WEP key 3 as its default key to transmit. The two devices will communicate 
as long as the AP’s WEP key 2 is the same as the client’s WEP key 2 and the AP’s WEP key 3 is 
the same as the client’s WEP key 3.
WPA Wireless Security
Wi-Fi Protected Access (WPA) is a specification of standards-based, interoperable security 
enhancements that increase the level of data protection and access control for existing and future 
wireless LAN systems. 
The IEEE introduced the WEP as an optional security measure to secure 802.11b (Wi-Fi) WLANs, 
but inherent weaknesses in the standard soon became obvious. In response to this situation, the 
Wi-Fi Alliance announced a new security architecture in October 2002 that remedies the short 
comings of WEP. This standard, formerly known as Safe Secure Network (SSN), is designed to 
work with existing 802.11 products and offers forward compatibility with 802.11i, the new 
wireless security architecture being defined in the IEEE. 
WPA offers the following benefits: 
Enhanced data privacy
Robust key management
Data origin authentication
Data integrity protection