Appendix D Wireless LANs
P-873HNU(P)-51B User’s Guide
320
messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a
network. Other WPA2 authentication features that are different from WPA include key caching and
pre-authentication. These two features are optional and may not be supported in all wireless
devices.
Key caching allows a wireless client to store the PMK it derived through a successful authentication
with an AP. The wireless client uses the PMK when it tries to connect to the same AP and does not
need to go with the authentication process again.
Pre-authentication enables fast roaming by allowing the wireless client (already connecting to an
AP) to perform IEEE 802.1x authentication with another AP before connecting to it.
Wireless Client WPA Supplicants
A wireless client supplicant is the software that runs on an operating system instructing the wireless
client how to use WPA. At the time of writing, the most widely available supplicant is the WPA patch
for Windows XP, Funk Software's Odyssey client.
The Windows XP patch is a free download that adds WPA capability to Windows XP's built-in "Zero
Configuration" wireless client. However, you must run Windows XP to use it.
WPA(2) with RADIUS Application Example
To set up WPA(2), you need the IP address of the RADIUS server, its port number (default is 1812),
and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server
looks as follows. "A" is the RADIUS server. "DS" is the distribution system.
1
The AP passes the wireless client's authentication request to the RADIUS server.
2
The RADIUS server then checks the user's identification against its database and grants or denies
network access accordingly.
3
A 256-bit Pairwise Master Key (PMK) is derived from the authentication process by the RADIUS
server and the client.
4
The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and
management system, using the PMK to dynamically generate unique data encryption keys. The
keys are used to encrypt every data packet that is wirelessly communicated between the AP and
the wireless clients.
Summary of Contents for P-873HNU-51B
Page 4: ...Contents Overview P 873HNU P 51B User s Guide 4...
Page 13: ...Table of Contents P 873HNU P 51B User s Guide 13 Appendix F Legal Information 329 Index 333...
Page 14: ...Table of Contents P 873HNU P 51B User s Guide 14...
Page 15: ...15 PART I User s Guide...
Page 16: ...16...
Page 32: ...Chapter 2 The Web Configurator P 873HNU P 51B User s Guide 32...
Page 57: ...57 PART II Technical Reference...
Page 58: ...58...
Page 64: ...Chapter 5 Network Map and Status Screens P 873HNU P 51B User s Guide 64...
Page 108: ...Chapter 7 Wireless P 873HNU P 51B User s Guide 108...
Page 132: ...Chapter 9 Static Routing P 873HNU P 51B User s Guide 132...
Page 152: ...Chapter 10 Quality of Service QoS P 873HNU P 51B User s Guide 152...
Page 168: ...Chapter 11 Network Address Translation NAT P 873HNU P 51B User s Guide 168...
Page 182: ...Chapter 13 IGMP P 873HNU P 51B User s Guide 182...
Page 188: ...Chapter 14 Interface Group P 873HNU P 51B User s Guide 188...
Page 202: ...Chapter 17 Parental Control P 873HNU P 51B User s Guide 202...
Page 224: ...Chapter 22 Logs P 873HNU P 51B User s Guide 224...
Page 234: ...Chapter 25 xDSL Statistics P 873HNU P 51B User s Guide 234...
Page 238: ...Chapter 26 Users Configuration P 873HNU P 51B User s Guide 238...
Page 244: ...Chapter 27 Remote Management P 873HNU P 51B User s Guide 244...
Page 250: ...Chapter 29 Logs Setting P 873HNU P 51B User s Guide 250...
Page 256: ...Chapter 31 Configuration P 873HNU P 51B User s Guide 256...
Page 262: ...Chapter 32 Diagnostic P 873HNU P 51B User s Guide 262...
Page 274: ...Chapter 34 Product Specifications P 873HNU P 51B User s Guide 274...
Page 310: ...Appendix C Pop up Windows JavaScript and Java Permissions P 873HNU P 51B User s Guide 310...
Page 324: ...Appendix D Wireless LANs P 873HNU P 51B User s Guide 324...