Wpa Authentication: Enterprise-Level User Authentication Via 802.1X/Eap And Radius - NETGEAR WGU624 Reference Manual

Double 108 mbps wireless firewall router
Hide thumbs Also See for WGU624:
Table of Contents

Advertisement

Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
WPA Authentication: Enterprise-level User
Authentication via 802.1x/EAP and RADIUS
Wired Network with Optional
Wireless LAN
802.1x Port Based Network
Access Control
TCP/IP
WPA enabled
Ports Closed
WPA
Certificate
Until
Access Point
RADIUS Server
enabled
Authority
using
wireless
Login
(for
pre-shared key
client with
example
Authentication
or
TCP/IP
"supplicant"
Win Server,
Ports Opened
802.1x
VeriSign)
After
Authenticated
Figure D-1: WPA Overview
IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a
protected network, as well as providing a vehicle for dynamically varying data encryption keys via
EAP from a RADIUS server, for example. This framework enables using a central authentication
server, which employs mutual authentication so that a rogue wireless user does not join the
network.
It is important to note that 802.1x does not provide the actual authentication mechanisms. When
using 802.1x, the EAP type, such as Transport Layer Security (EAP-TLS), or EAP Tunneled
Transport Layer Security (EAP-TTLS), defines how the authentication takes place.
Note: For environments with a Remote Authentication Dial-In User Service (RADIUS)
infrastructure, WPA supports Extensible Authentication Protocol (EAP). For environments
without a RADIUS infrastructure, WPA supports the use of a pre-shared key.
Together, these technologies provide a framework for strong user authentication.
Windows XP implements 802.1x natively, and several NETGEAR switch and wireless access
point products support 802.1x.
D-12
Wireless Networking Basics
M-10153-01

Advertisement

Table of Contents
loading

Table of Contents