Appendix D Wireless LANs
AMG1302-T10A User’s Guide
273
RADIUS is a simple package exchange in which your AP acts as a message relay between the
wireless client and the network RADIUS server.
Types of RADIUS Messages
The following types of RADIUS messages are exchanged between the access point and the RADIUS
server for user authentication:
• Access-Request
Sent by an access point requesting authentication.
• Access-Reject
Sent by a RADIUS server rejecting access.
• Access-Accept
Sent by a RADIUS server allowing access.
• Access-Challenge
Sent by a RADIUS server requesting more information in order to allow access. The access point
sends a proper response from the user and then sends another Access-Request message.
The following types of RADIUS messages are exchanged between the access point and the RADIUS
server for user accounting:
• Accounting-Request
Sent by the access point requesting accounting.
• Accounting-Response
Sent by the RADIUS server to indicate that it has started or stopped accounting.
In order to ensure network security, the access point and the RADIUS server use a shared secret
key, which is a password, they both know. The key is not sent over the network. In addition to the
shared key, password information exchanged is also encrypted to protect the network from
unauthorized access.
Types of EAP Authentication
This section discusses some popular authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP and
LEAP. Your wireless LAN device may not support all authentication types.
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE
802.1x transport mechanism in order to support multiple types of user authentication. By using EAP
to interact with an EAP-compatible RADIUS server, an access point helps a wireless station and a
RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server and an intermediary AP(s) that
supports IEEE 802.1x.
For EAP-TLS authentication type, you must first have a wired connection to the network and obtain
the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs) can be used
to authenticate users and a CA issues certificates and guarantees the identity of each certificate
owner.
Summary of Contents for AMG1302-T10A
Page 4: ...Contents Overview AMG1302 T10A User s Guide 4 ...
Page 12: ...Table of Contents AMG1302 T10A User s Guide 12 ...
Page 13: ...13 PART I User s Guide ...
Page 14: ...14 ...
Page 20: ...Chapter 1 Introduction AMG1302 T10A User s Guide 20 ...
Page 52: ...Chapter 4 Tutorials AMG1302 T10A User s Guide 52 ...
Page 53: ...53 PART II Technical Reference ...
Page 54: ...54 ...
Page 126: ...Chapter 8 Wireless LAN AMG1302 T10A User s Guide 126 ...
Page 140: ...Chapter 9 Network Address Translation NAT AMG1302 T10A User s Guide 140 ...
Page 158: ...Chapter 11 Filters AMG1302 T10A User s Guide 158 ...
Page 162: ...Chapter 12 Static Route AMG1302 T10A User s Guide 162 ...
Page 166: ...Chapter 13 Port Binding AMG1302 T10A User s Guide 166 ...
Page 176: ...Chapter 15 Quality of Service QoS AMG1302 T10A User s Guide 176 ...
Page 198: ...Chapter 18 Universal Plug and Play UPnP AMG1302 T10A User s Guide 198 ...
Page 202: ...Chapter 19 CWMP AMG1302 T10A User s Guide 202 ...
Page 206: ...Chapter 20 System Settings AMG1302 T10A User s Guide 206 ...
Page 216: ...Chapter 21 Logs AMG1302 T10A User s Guide 216 ...
Page 266: ...Appendix C Pop up Windows JavaScripts and Java Permissions AMG1302 T10A User s Guide 266 ...
Page 280: ...Appendix D Wireless LANs AMG1302 T10A User s Guide 280 ...
Page 290: ...Appendix E IPv6 AMG1302 T10A User s Guide 290 ...
Page 322: ...Appendix G Legal InformationSafety Warnings AMG1302 T10A User s Guide 322 ...