Netgear WGR614 Manual de usuario Pagina 9

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 154
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 8
Contents ix
202-10099-01, April 2005
Are Login Protocols U sed? ...................................................................................C-20
What Is Your Configuration Information? ..............................................................C-20
Obtaining ISP Configuration Information for W indows C om puters .......................C-21
Obtaining ISP Configuration Information for M acintosh C om puters .....................C-22
Restarting the Network ................................................................................................C-23
Appendix D
Wireless Networking Basics
Wireless Networking Overview ......................................................................................D -1
Infrastructure Mode .................................................................................................D -1
Ad Hoc M ode (Peer-to-Peer Workgroup) ................................................................D -2
Network Name: Extended Service Set Identification (ESSID ) ................................D -2
Authentication and WEP D ata Encryption .....................................................................D -2
802.11 Authentication ..............................................................................................D -3
Open System Authentication ...................................................................................D -3
Shared Key Authentication ......................................................................................D -4
Overview of WEP Parameters ................................................................................D -5
Key Size ..................................................................................................................D -6
WEP Configuration Options ....................................................................................D -7
Wireless Channels .........................................................................................................D -7
WPA and W PA2 Wireless Security ................................................................................D -8
How D oes WPA Compare to WEP? ........................................................................D -9
How Does WPA Compare to WPA2 (IEEE 802.11i)? ............................................D -10
What are the Key Features of WPA and WPA2 Security? ....................................D -10
WPA/WPA2 Authentication: Enterprise-level User
Authentication via 802.1x/EAP and R AD IU S ..................................................D -12
WPA/W PA2 D ata Encryption Key M anagement .............................................D -14
Is WPA/WPA2 Perfect? .........................................................................................D -16
Product Support for WPA/WPA2 ...........................................................................D -16
Supporting a Mixture of WPA, WPA2, and WEP Wireless Clients is Discouraged D-16
Changes to Wireless Access Points ...............................................................D -17
Changes to Wireless Network Adapters .........................................................D -17
Changes to Wireless Client Programs ............................................................D -18
Glossary
Vista de pagina 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 153 154

Comentarios a estos manuales

Sin comentarios