Dynamic Wep Key Exchange; Introduction To Wpa; Figure 31 Eap Authentication - ZyXEL Communications ZyWALL 5 User Manual

Hide thumbs Also See for ZyWALL 5:
Table of Contents

Advertisement

Figure 31 EAP Authentication

The details below provide a general description of how IEEE 802.1x EAP authentication
works.
• The wireless station sends a start message to the ZyWALL.
• The ZyWALL sends a request identity message to the wireless station for identity
information.
• The wireless station replies with identity information, including username and password.
• The RADIUS server checks the user information against its user profile database and
determines whether or not to authenticate the wireless station.

6.6 Dynamic WEP Key Exchange

The AP maps a unique key that is generated with the RADIUS server. This key expires when
the wireless connection times out, disconnects or reauthentication times out. A new WEP key
is generated each time reauthentication is performed.
If this feature is enabled, it is not necessary to configure a default encryption key in the
Wireless screen. You may still configure and store keys here, but they will not be used while
Dynamic WEP is enabled.
To use Dynamic WEP, enable and configure Dynamic WEP Key Exchange in the Wireless
screen (see
SERVER RADIUS screen (see
EAP type is configured to one of the following:
• EAP-TLS
• EAP-TTLS
• PEAP
Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange.

6.7 Introduction to WPA

Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification draft.
Key differences between WPA and WEP are user authentication and improved data
encryption.
Chapter 6 Wireless LAN
Section 6.11.4 on page
114) and configure RADIUS server settings in the AUTH
Section 16.5 on page
ZyWALL 5 User's Guide
279). Ensure that the wireless station's
105

Advertisement

Table of Contents
loading

Table of Contents