Appendix D Wireless LANs
P-320W v3 User’s Guide
242
However, MD5 authentication has some weaknesses. Since the authentication
server needs to get the plaintext passwords, the passwords must be stored. Thus
someone other than the authentication server may access the password file. In
addition, it is possible to impersonate an authentication server as MD5
authentication method does not perform mutual authentication. Finally, MD5
authentication method does not support data encryption with dynamic session
key. You must configure WEP encryption keys for data encryption.
EAP-TLS (Transport Layer Security)
With EAP-TLS, digital certifications are needed by both the server and the wireless
stations for mutual authentication. The server presents a certificate to the client.
After validating the identity of the server, the client sends a different certificate to
the server. The exchange of certificates is done in the open before a secured
tunnel is created. This makes user identity vulnerable to passive attacks. A digital
certificate is an electronic ID card that authenticates the sender’s identity.
However, to implement EAP-TLS, you need a Certificate Authority (CA) to handle
certificates, which imposes a management overhead.
EAP-TTLS (Tunneled Transport Layer Service)
EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for
only the server-side authentications to establish a secure connection. Client
authentication is then done by sending username and password through the
secure connection, thus client identity is protected. For client authentication, EAP-
TTLS supports EAP methods and legacy authentication methods such as PAP,
CHAP, MS-CHAP and MS-CHAP v2.
PEAP (Protected EAP)
Like EAP-TTLS, server-side certificate authentication is used to establish a secure
connection, then use simple username and password methods through the
secured connection to authenticate the clients, thus hiding client identity.
However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2
and EAP-GTC (EAP-Generic Token Card), for client authentication. EAP-GTC is
implemented only by Cisco.
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of
IEEE 802.1x.
Dynamic WEP Key Exchange
The AP maps a unique key that is generated with the RADIUS server. This key
expires when the wireless connection times out, disconnects or reauthentication
times out. A new WEP key is generated each time reauthentication is performed.
Summary of Contents for P-320W v3
Page 2: ......
Page 8: ...Safety Warnings P 320W v3 User s Guide 8 ...
Page 10: ...Contents Overview P 320W v3 User s Guide 10 ...
Page 18: ...Table of Contents P 320W v3 User s Guide 18 ...
Page 20: ...20 ...
Page 24: ...Chapter 1 Getting to Know Your P 320W v3 P 320W v3 User s Guide 24 ...
Page 36: ...Chapter 2 Introducing the Web Configurator P 320W v3 User s Guide 36 ...
Page 54: ...54 ...
Page 72: ...Chapter 4 Wireless LAN P 320W v3 User s Guide 72 ...
Page 76: ...Chapter 5 Wireless Client Mode P 320W v3 User s Guide 76 ...
Page 88: ...Chapter 7 LAN P 320W v3 User s Guide 88 ...
Page 104: ...Chapter 10 VLAN P 320W v3 User s Guide 104 ...
Page 105: ...105 PART III Security Firewall 117 Content Filtering 125 ...
Page 106: ...106 ...
Page 116: ...Chapter 11 WAN P 320W v3 User s Guide 116 ...
Page 124: ...Chapter 12 Firewall P 320W v3 User s Guide 124 ...
Page 130: ...130 ...
Page 134: ...Chapter 14 Static Route P 320W v3 User s Guide 134 ...
Page 140: ...Chapter 15 Remote Management P 320W v3 User s Guide 140 ...
Page 154: ...Chapter 16 Universal Plug and Play UPnP P 320W v3 User s Guide 154 ...
Page 155: ...155 PART V Maintenance and Troubleshooting System 157 Logs 163 Product Specifications 193 ...
Page 156: ...156 ...
Page 178: ...Chapter 18 Logs P 320W v3 User s Guide 178 ...
Page 184: ...Chapter 19 Tools P 320W v3 User s Guide 184 ...
Page 192: ...Chapter 20 Troubleshooting P 320W v3 User s Guide 192 ...
Page 196: ...Chapter 21 Product Specifications P 320W v3 User s Guide 196 ...
Page 198: ...198 ...
Page 260: ...Index P 320W v3 User s Guide 260 ...
Page 261: ......
Page 262: ......