Wpa Authentication: Enterprise-Level User Authentication Via 802.1X/Eap And Radius - NETGEAR WGM124 Setup Manual

Netgear wireless router setup manual
Hide thumbs Also See for WGM124:
Table of Contents

Advertisement

NETGEAR Wireless Router Setup Manual
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
Wireless LAN
WPA
enabled
wireless
client with
"supplicant"
Figure D-3: WPA Overview
IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a
protected network, as well as providing a vehicle for dynamically varying data encryption keys via
EAP from a RADIUS server, for example. This framework enables using a central authentication
server, which employs mutual authentication so that a rogue wireless user does not join the
network.
It's important to note that 802.1x doesn't provide the actual authentication mechanisms. When
using 802.1x, the EAP type, such as Transport Layer Security (EAP-TLS) or EAP Tunneled
Transport Layer Security (EAP-TTLS) defines how the authentication takes place.
Note: For environments with a Remote Authentication Dial-In User Service (RADIUS)
infrastructure, WPA supports Extensible Authentication Protocol (EAP). For environments
without a RADIUS infrastructure, WPA supports the use of a preshared key.
Together, these technologies provide a framework for strong user authentication.
Windows XP implements 802.1x natively, and several Netgear switch and wireless access point
products support 802.1x.
D-12
WPA enabled
Access Point
using
pre-shared key
or
Ports Opened
802.1x
Authenticated
December 2004
Wired Network with Optional
802.1x Port Based Network
Access Control
TCP/IP
Ports Closed
Until
RADIUS Server
Authentication
TCP/IP
After
Certificate
Authority
(eg Win
Server,
Login
VeriSign,
etc)
Wireless Networking Basics

Advertisement

Table of Contents
loading

This manual is also suitable for:

Wgm124naGs608na

Table of Contents