Appendix D Wireless LANs
B222s User’s Guide
235
RADIUS is a simple package exchange in which your AP acts as a message relay between the
wireless client and the network RADIUS server.
Types of RADIUS Messages
The following types of RADIUS messages are exchanged between the access point and the RADIUS
server for user authentication:
• Access-Request
Sent by an access point requesting authentication.
• Access-Reject
Sent by a RADIUS server rejecting access.
• Access-Accept
Sent by a RADIUS server allowing access.
• Access-Challenge
Sent by a RADIUS server requesting more information in order to allow access. The access point
sends a proper response from the user and then sends another Access-Request message.
The following types of RADIUS messages are exchanged between the access point and the RADIUS
server for user accounting:
• Accounting-Request
Sent by the access point requesting accounting.
• Accounting-Response
Sent by the RADIUS server to indicate that it has started or stopped accounting.
In order to ensure network security, the access point and the RADIUS server use a shared secret
key, which is a password, they both know. The key is not sent over the network. In addition to the
shared key, password information exchanged is also encrypted to protect the network from
unauthorized access.
Types of EAP Authentication
This section discusses some popular authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP and
LEAP. Your wireless LAN device may not support all authentication types.
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE
802.1x transport mechanism in order to support multiple types of user authentication. By using EAP
to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a
RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that
supports IEEE 802.1x. .
For EAP-TLS authentication type, you must first have a wired connection to the network and obtain
the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs) can be used
to authenticate users and a CA issues certificates and guarantees the identity of each certificate
owner.
Summary of Contents for B222s
Page 4: ...Contents Overview B222s User s Guide 4 ...
Page 12: ...Table of Contents B222s User s Guide 12 ...
Page 13: ...13 PART I User s Guide ...
Page 14: ...14 ...
Page 28: ...28 ...
Page 78: ...Chapter 7 Routing B222s User s Guide 78 ...
Page 82: ...Chapter 8 DNS Route B222s User s Guide 82 ...
Page 102: ...Chapter 10 Network Address Translation NAT B222s User s Guide 102 ...
Page 114: ...Chapter 12 Firewall B222s User s Guide 114 ...
Page 120: ...Chapter 14 Parental Control B222s User s Guide 120 ...
Page 125: ...Chapter 15 VoIP B222s User s Guide 125 ...
Page 144: ...Chapter 15 VoIP B222s User s Guide 144 ...
Page 154: ...Chapter 17 Traffic Status B222s User s Guide 154 ...
Page 156: ...Chapter 18 User Account B222s User s Guide 156 ...
Page 170: ...Chapter 24 Backup Restore B222s User s Guide 170 ...
Page 172: ...Chapter 25 Diagnostic B222s User s Guide 172 ...
Page 218: ...Appendix B Setting Up Your Computer s IP Address B222s User s Guide 218 ...
Page 228: ...Appendix C Pop up Windows JavaScript and Java Permissions B222s User s Guide 228 ...
Page 252: ...Appendix E Common Services B222s User s Guide 252 ...