
-57-
APPENDIX C: 802.1x Authentication Setup
There are three essential components to the 802.1x infrastructure: (1) Supplicant, (2)
Authe nticator and (3) Server. The 802.1x security supports both MD5 and TLS Extensive
Authentication Protocol (EAP). The 802.1x Authentication is a complement to the current WEP
encryption used in wireless network. The current security weakness of WEP encryp tion is that
there is no key management and no limitation for the duration of key lifetime. 802.1x
Authentication offers key management, which includes key per user and key per session, and
limits the lifetime of the keys to certain duration. Thus, key decryption by unauthorized
attacker becomes extremely difficult, and the wireless network is safely secured. We will
introduce the 802.1x Authentication infrastructure as a whole and going into details of the setup
for each essential component in 802.1x authentication.
802.1x Authentication Infrastructure
The Infrastructure diagram showing above illustrates that a group of 802.11 wireless clients is
trying to form a 802.11 wireless network with the Access Point in order to have access to the
Internet/Intranet. In 802.1x authentication infrastructure, each of these wireless clients would
have to be authenticated by the Radius server, which would grant the authorized client and
notified the Access Point to open up a communication port to be used for the granted client.
There are 2 Extensive Authentication Protocol (EAP) methods supported: (1) MD5 and (2) TLS.
802.11 Wireless
Access Points
Support 802.1X
RADIUS
Server
Authentication Request
Internet/
Intranet
Authentication Success
802.11 Wireless
Clients
Support 802.1X
Public
802.11
Wireless
Networks
Summary of Contents for WAP-0003
Page 1: ...1 LevelOne WAP 0003 54Mbps Wireless Access Point User s Manual V 1 0...
Page 26: ...26 when LevelOne Access Point re operates after it restarts...
Page 28: ...28 4 Click Install on the menu bar to proceed with 54M AP installation...
Page 65: ...65 17 Select User Certificate request and click Next to continue...
Page 66: ...66 18 Click Submit to continue...
Page 67: ...67 19 The Certificate Service is now processing the certificate request...
Page 83: ...83 23 Select Internet Authentication Service and click OK to install...
Page 88: ...88 33 Click Edit Profile to open up...
Page 93: ...93 41 Select Group Policy tab and click Edit to edit the Group Policy...