Huawei quidway s7700 Configuration Manual page 198

Smart routing switch
Hide thumbs Also See for quidway s7700:
Table of Contents

Advertisement

Quidway S7700 Smart Routing Switch
Configuration Guide - SPU
WLAN Service Data Security
Compared with wired networks, WLANs have data security risks. All the WLAN devices in an
area share the same transmission medium, and any WLAN device can receive data from all the
other WLAN devices. This makes WLAN access data vulnerable to attacks.
The 802.11 protocol is dedicated to addressing security threats on WLANs. In addition to
authentication, it encrypts data packets and allows only specified devices to successfully decrypt
the data packets. Other devices can receive data packets but fail to decrypt these packets because
they do not have the required key. This protects WLAN data.
Currently, RC4 encryption, Temporal Key Integrity Protocol (TKIP) encryption, and Counter
Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) encryption
are supported.
User Access Authentication
l
l
l
Issue 01 (2011-07-15)
sent to the wireless client. If the two character strings are the same, the wireless client
and AP have the same shared key and the wireless client passes shared key
authentication. Otherwise, the wireless client fails to be authenticated.
Figure 5-5 Shared key authentication
Client
Authentication Request
Authentication Response (Challenge)
Authentication (Encripted Challenge)
Authentication Response (Success)
Pre-shared key (PSK) authentication
PSK authentication requires a wireless client and an AP to be configured with the same
pre-shared key. If their pre-shared keys are the same, the wireless client passes PSK
authentication; otherwise, the wireless client fails to be authenticated.
802.1x authentication
The 802.1x protocol is a port-based network access control protocol. It authenticates and
controls user devices connected to an interface on a WLAN access device. User devices
connected to the interface can access WLAN resources only after they are authenticated.
MAC address authentication
MAC address authentication controls the network access authority of a user based on the
access interface and MAC address of the user. The user does not need to install any client
software. After detecting the MAC address of the user for the first time, a WLAN access
device starts authenticating the user.
Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
5 WLAN Configuration
AP
187

Advertisement

Table of Contents
loading

Table of Contents