Contents
xi
March 2004, 202-10027-01
Outbound Log ................................................................................................................ D-1
Inbound Log ................................................................................................................... D-2
Other IP Traffic .............................................................................................................. D-2
Router Operation ........................................................................................................... D-3
Other Connections and Traffic to this Router ................................................................ D-4
DoS Attack/Scan ........................................................................................................... D-4
Access Block Site .......................................................................................................... D-6
All Web Sites and News Groups Visited ........................................................................ D-6
System Admin Sessions ................................................................................................ D-6
Policy Administration LOG ............................................................................................. D-7
Appendix E
Wireless Networking Basics
Wireless Networking Overview ...................................................................................... E-1
Infrastructure Mode ................................................................................................. E-1
Ad Hoc Mode (Peer-to-Peer Workgroup) ................................................................ E-2
Network Name: Extended Service Set Identification (ESSID) ................................ E-2
Authentication and WEP Data Encryption ..................................................................... E-2
802.11 Authentication .............................................................................................. E-3
Open System Authentication ................................................................................... E-3
Shared Key Authentication ...................................................................................... E-4
Overview of WEP Parameters ................................................................................ E-5
Key Size .................................................................................................................. E-6
WEP Configuration Options .................................................................................... E-7
Wireless Channels ......................................................................................................... E-7
WPA Wireless Security .................................................................................................. E-8
How Does WPA Compare to WEP? ........................................................................ E-9
How Does WPA Compare to IEEE 802.11i? ........................................................ E-10
What are the Key Features of WPA Security? ...................................................... E-10
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS .................................................. E-12
WPA Data Encryption Key Management ........................................................ E-14
Is WPA Perfect? .................................................................................................... E-16
Product Support for WPA ...................................................................................... E-16
Supporting a Mixture of WPA and WEP Wireless Clients is Discouraged ...... E-16
Changes to Wireless Access Points ............................................................... E-17
Changes to Wireless Network Adapters ......................................................... E-17