Wlan Security Configuration; Wlan Security Overview - Huawei quidway s7700 Configuration Manual

Smart routing switch
Hide thumbs Also See for quidway s7700:
Table of Contents

Advertisement

Quidway S7700 Smart Routing Switch
Configuration Guide - SPU

5.2 WLAN Security Configuration

This chapter describes how to configure WLAN security in the AC + fit AP networking mode.

5.2.1 WLAN Security Overview

The wireless security feature provided by 802.11 authentication can defend against common
network attacks. However, 802.11 authentication cannot protect networks containing sensitive
data well because a few hackers can still access WLANs. To prevent unauthorized user access,
a security mechanism more secure than 802.11 authentication is required. Link authentication,
WLAN service data security, and user access authentication are used to provide higher security.
Link Authentication
l
l
Issue 01 (2011-07-15)
trunk
port trunk allow-pass vlan 100 to
102
#
Open system authentication
Open system authentication is the default and simplest authentication mode in which users
do not need to be authenticated. The open system authentication process is as follows:
1.
A wireless client initiates an authentication request.
2.
An access point (AP) confirms that the wireless client has passed link authentication
and responds to the wireless client with an authentication success message.
Figure 5-4 Open system authentication
Client
Authentication Request
Authentication Response
Shared key authentication
Shared key authentication requires a wireless client and an AP to be configured with the
same shared key.
The shared key authentication process is as follows:
1.
A wireless client initiates an authentication request to an AP. The AP then generates
a Challenge packet (a character string) and sends it to the wireless client.
2.
The wireless client generates a new message based on the received character string,
encrypts the message with a key, and then sends the message to the AP.
3.
After receiving the message from the wireless client, the AP decrypts it with a key
and then compares the decrypted character string with the original character string
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
AP
5 WLAN Configuration
186

Advertisement

Table of Contents
loading

Table of Contents