Open Authentication To The Access Point; Shared Key Authentication To The Access Point - Allen-Bradley Stratix 5100 User Manual

Wireless access point/workgroup bridge
Hide thumbs Also See for Stratix 5100:
Table of Contents

Advertisement

Chapter 12
Configuring Authentication Types
Open Authentication to the
Access Point
352
Open authentication allows any device to authenticate and then attempt to
communicate with the access point. By using open authentication, any wireless
device can authenticate with the access point, but the device can communicate
only if its WEP keys match the access point's. Devices not using WEP don't
attempt to authenticate with an access point that is using WEP. Open
authentication does not rely on a RADIUS server on your network.
This figure shows the authentication sequence between a device trying to
authenticate and an access point by using open authentication. In this example,
the device's WEP key does not match the access point's key, so it can authenticate
but not pass data.
Figure 91 - Sequence for Open Authentication
Client device
with WEP key = 321
1. Authentication request
2. Authentication response
3. Association request
4. Association response
5. WEP data frame to wired network

Shared Key Authentication to the Access Point

Cisco provides shared key authentication to comply with the IEEE 802.11b
standard. However, because of shared key's security flaws, avoid using it.
During shared key authentication, the access point sends an unencrypted
challenge text string to any device attempting to communicate with the access
point. The device requesting authentication encrypts the challenge text and sends
it back to the access point. If the challenge text is encrypted correctly, the access
point allows the requesting device to authenticate.
Both the unencrypted challenge and the encrypted challenge can be monitored,
however, that leaves the access point open to attack from an intruder who
calculates the WEP key by comparing the unencrypted and encrypted text
strings. Because of this weakness, shared key authentication can be less secure
than open authentication. Like open authentication, shared key authentication
does not rely on a RADIUS server on your network.
Figure 92 on page 353
shows the authentication sequence between a device
trying to authenticate and an access point by using shared key authentication. In
this example the device's WEP key matches the access point's key, so it can
authenticate and communicate.
Rockwell Automation Publication 1783-UM006A-EN-P - May 2014
6. Key mismatch, frame discarded
Access point
or bridge
with WEP key = 123

Advertisement

Table of Contents
loading

This manual is also suitable for:

1783-wapak91783-wapek91783-wapck91783-wapzk9

Table of Contents