Authentication Type - ZyXEL Communications SBG Series Support Notes

Wireless n fiber wan small business gateway
Table of Contents

Advertisement

ZyXEL – SBG Support Notes
message when a client associates to an AP. A sniffer just has to wait for a
valid user to associate with the network to see the SSID.
What are Insertion attacks?
The insertion attacks are based on placing unauthorized devices on the
wireless network without going through a security process and review.
What is a wireless sniffer?
An attacker can sniff and capture legitimate traffic. Many of the sniffer
tools for Ethernet are based on capturing the first part of the connection
session, where the data would typically include the username and
password. An intruder can masquerade as that user by using this captured
information. An intruder who monitors the wireless network can apply this
same attack principle on the wireless.
What is the difference between Open System and Shared Key of

authentication type?

Open System:
The default authentication service that simply announces the desire to
associate with another station or access point. A station can authenticate
with any other station or access point using open system authentication if
the receiving station designates open system authentication.
Shared Key:
The optional authentication that involves a more rigorous exchange of
frames, ensuring that the requesting station is authentic. For a station to
use shared key authentication, it must implement WEP.
What is 802.1x?
IEEE 802.1x port-based network access control is an IEEE (Institute of
Electrical and Electronics Engineers) standard, which specifies a standard
mechanism for authenticating, at the link layer (Layer 2), users' access to
IEEE 802 networks such as Ethernet (IEEE 802.3) and Wireless LAN (IEEE
802.11). For IEEE 802.11 WLAN, IEEE 802.1x authentication can be based
on username/password or digital certificate.
36
Back to Table of Contents

Advertisement

Table of Contents
loading

Table of Contents