User's Manual

RadioFrame System Method of Procedure GSM/802.11b
Connecting to the Customer LAN
74 RadioFrame Networks, Inc.
The SSID is necessary because, unlike wired LANs, a device that is part of an 802.11
LAN may be within radio range of multiple “groups” of 802.11 stations. In order to isolate
stations in one group from stations in another group, the SSID was created. It is an
802.11-only construct, which does not exist for any other type of LAN. The SSID
identifies a collection of 802.11 stations for the purpose of communication as a group.
The SSID is 1 to 32 characters in length. Typically, the SSID reflects the owner of the
RFS. This way, users can distinguish their LAN from any other 802.11 LAN that might
physically overlap their area.
For example, the SSID “Customer_Marketing” could provide the Marketing department
with its own distinct wireless LAN. Other departments, such as “Customer_Operations”,
might be in close proximity to the Marketing department. The staff in the two departments
would both have 802.11 access to the company LAN, but their access would be provided
via different iRAPs, based on which SSID they use.
6.2.3 WEP Encryption
The Wired Equivalent Privacy (WEP) encryption technology is defined in the IEEE 802.11
standard, and is intended to provide the same quality of privacy and access control for an
802.11 LAN as is provided for a wired LAN. That is, a WEP-protected 802.11 should be
no easier to infiltrate or eavesdrop than would be on a wired LAN.
Any LAN (wired or wireless) can be made more secure and private by applying additional
security measures (such as encryption, centralized strong authentication, firewalling,
etc.). The difference between a wired LAN and a wireless LAN, however, is that without
including encryption of user traffic and encryption-based access control, a wireless LAN
is inherently less secure than a wired LAN, all other things being equal.
6.2.3.1 Encryption (On/Off)
WEP encryption is enabled or disabled by selecting “On” or “Off,” respectively. When
“Off” is selected, all other items related to WEP encryption are disabled (WEP Keys and
Shared Key Authentication), and need not be configured. When “On” is selected, then the
WEP keys must be entered.
6.2.3.2 Shared Key Authentication
When Shared Key Authentication is enabled, or “checked,” the iRAPs will require client
devices (such as laptop computers) to prove their authenticity by answering a challenge
from the iRAP. This challenge (authentication protocol) can be answered correctly only if
the client device “knows” the WEP keys configured into this RFS.
NOTE: RFN does not recommend the use of Shared key authentication, because the
messages used to accomplish this authentication may provide information to
eavesdroppers as an aid in cracking the WEP encryption on future messages. The ability
to enable or disable Shared Key Authentication is provided mainly for compatibility
purposes. Some client adapters may require Shared Key Authentication whenever WEP
encryption is enabled. If this is not the case with the client adapters used in your location,
then it is best to leave this setting disabled. This does not compromise security, however,
because with WEP encryption enabled, the iRAP will not accept traffic from 802.11 client
devices unless the traffic is encrypted.