Wpa With Radius Application Example; Figure 44 Eap Authentication - ZyXEL Communications PRESTIGE 335 User Manual

Firewall router with print server, 802.11g wireless firewall router with print server
Table of Contents

Advertisement

The type of authentication you use depends on the RADIUS server or the AP. The Prestige
supports EAP-TLS, EAP-TTLS and PEAP with RADIUS. Refer to the Types of EAP
Authentication appendix for descriptions on the four common types.
Your Prestige supports EAP-MD5 (Message-Digest Algorithm 5) with RADIUS.
The following figure shows an overview of authentication when you specify a RADIUS server
on your access point.

Figure 44 EAP Authentication

The details below provide a general description of how IEEE 802.1x EAP authentication
works. For an example list of EAP-MD5 authentication steps, see the IEEE 802.1x appendix.
1 The wireless station sends a "start" message to the Prestige.
2 The Prestige sends a "request identity" message to the wireless station for identity
information.
3 The wireless station replies with identity information, including username and password.
4 The RADIUS server checks the user information against its user profile database and
determines whether or not to authenticate the wireless station.

8.8.2 WPA with RADIUS Application Example

You need the IP address of the RADIUS server, its port number (default is 1812), and the
RADIUS shared secret. A WPA application example with an external RADIUS server looks
as follows. "A" is the RADIUS server. "DS" is the distribution system.
1 The AP passes the wireless client's authentication request to the RADIUS server.
2 The RADIUS server then checks the user's identification against its database and grants
or denies network access accordingly.
3 The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then
sets up a key hierarchy and management system, using the pair-wise key to dynamically
generate unique data encryption keys to encrypt every data packet that is wirelessly
communicated between the AP and the wireless clients.
Chapter 8 Wireless Security
P-335 Series User's Guide
117

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-335P-335wt

Table of Contents