
Introduction
1-9
1.2.8.2 EAP Authentication
The
Extensible Authentication Protocol (EAP)
feature provides access points and their associated
MU’s an additional measure of security for data transmitted over the wireless network. Using EAP,
authentication between devices is achieved through the exchange and verification of certificates.
EAP is a mutual authentication method whereby both the MU and AP are required to prove their
identities. Like Kerberos, the user loses device authentication if the server cannot provide proof of
device identification.
Using EAP, a user requests connection to a WLAN through the access point. The access point then
requests the identity of the user and transmits that identity to an authentication server. The server
prompts the AP for proof of identity (supplied to the by the user) and then transmits the user data
back to the server to complete the authentication process.
An MU is not able to access the network if not authenticated. When configured for EAP support, the
access point displays the MU as an EAP station.
EAP is only supported on mobile devices running Windows XP, Windows 2000 (using Service Pack #4)
and Windows Mobile 2003. Refer to the system administrator for information on configuring a Radius
Server for EAP (802.1x) support.
For detailed information on EAP configurations, see
Configuring 802.1x EAP Authentication on page
6-11
.
1.2.8.3 WEP Encryption
All WLAN devices face possible information theft. Theft occurs when an unauthorized user
eavesdrops to obtain information illegally. The absence of a physical connection makes wireless links
particularly vulnerable to this form of theft. Most forms of WLAN security rely on encryption to
various extents. Encryption entails scrambling and coding information, typically with mathematical
formulas called
algorithms
, before the information is transmitted. An algorithm is a set of instructions
or formula for scrambling the data. A
key
is the specific code used by the algorithm to encrypt or
decrypt the data.
Decryption
is the decoding and unscrambling of received encrypted data.
The same device, host computer or front-end processor, usually performs both encryption and
decryption. The transmit or receive direction determines whether the encryption or decryption
function is performed. The device takes plain text, encrypts or scrambles the text typically by
mathematically combining the key with the plain text as instructed by the algorithm, then transmits
the data over the network. At the receiving end, another device takes the encrypted text and decrypts,
or unscrambles, the text revealing the original message. An unauthorized user can know the
Summary of Contents for AP 5131 - Wireless Access Point
Page 1: ...AP 51xx Access Point Product Reference Guide ...
Page 3: ...AP 51xx Access Point Product Reference Guide 72E 103901 01 January 2008 ...
Page 4: ......
Page 44: ...AP 51xx Access Point Product Reference Guide 1 28 ...
Page 76: ...AP 51xx Access Point Product Reference Guide 2 32 ...
Page 92: ...AP 51xx Access Point Product Reference Guide 3 16 ...
Page 588: ...AP 51xx Access Point Product Reference Guide 8 254 ...
Page 610: ...AP 51xx Access Point Product Reference Guide 9 22 3 Define a mesh supported WLAN ...
Page 623: ...Configuring Mesh Networking 9 35 3 Determine the Radio MAC Address and BSSID MAC Addresses ...
Page 653: ...Adaptive AP 10 25 line con 0 line vty 0 24 end ...
Page 654: ...AP 51xx Access Point Product Reference Guide 10 26 ...
Page 666: ...AP 51xx Access Point Product Reference Guide A 12 ...
Page 690: ...AP 51xx Access Point Product Reference Guide C 4 ...
Page 696: ...AP 51xx Access Point Product Reference Guide IN 10 ...
Page 697: ......