ZyAIR G-3000 User’s Guide
Appendix K Wireless LAN With IEEE 802.1x
212
Appendix K
Wireless LAN With IEEE 802.1x
As wireless networks become popular for both portable computing and corporate networks,
security is now a priority.
Security Flaws with IEEE 802.11
Wireless networks based on the original IEEE 802.11 have a poor reputation for safety. The
IEEE 802.11b wireless access standard, first published in 1999, was based on the MAC
address. As the MAC address is sent across the wireless link in clear text, it is easy to spoof
and fake. Even the WEP (Wire Equivalent Privacy) data encryption is unreliable as it can be
easily decrypted with current computer speed
Deployment Issues with IEEE 802.11
User account management has become a network administrator’s nightmare in a corporate
environment, as the IEEE 802.11b standard does not provide any central user account
management. User access control is done through manual modification of the MAC address
table on the access point. Although WEP data encryption offers a form of data security, you
have to reset the WEP key on the clients each time you change your WEP key on the access
point.
IEEE 802.1x
In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to
support extended authentication as well as providing additional accounting and control
features. It is supported by Windows XP and a number of network devices.
Advantages of the IEEE 802.1x
• User based identification that allows for roaming.
• Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for
centralized user profile and accounting management on a network RADIUS server.
• Support for EAP (Extensible Authentication Protocol, RFC 2486) that allows additional
authentication methods to be deployed with no changes to the access point or the wireless
clients.
Summary of Contents for ZyAIR G-3000
Page 14: ...ZyAIR G 3000 User s Guide 15 Table of Contents...
Page 22: ...ZyAIR G 3000 User s Guide 23 List of Tables...
Page 26: ...ZyAIR G 3000 User s Guide 27 Preface...
Page 40: ...ZyAIR G 3000 User s Guide 41 Chapter 2 Introducing the Web Configurator...
Page 48: ...ZyAIR G 3000 User s Guide 49 Chapter 3 Wizard Setup...
Page 54: ...ZyAIR G 3000 User s Guide 55 Chapter 4 System Screens...
Page 100: ...ZyAIR G 3000 User s Guide 101 Chapter 8 IP Screen...
Page 116: ...ZyAIR G 3000 User s Guide 117 Chapter 10 Maintenance Figure 59 Restart Screen...
Page 122: ...ZyAIR G 3000 User s Guide 123 Chapter 11 Introducing the SMT...
Page 132: ...ZyAIR G 3000 User s Guide 133 Chapter 13 LAN Setup...
Page 174: ...ZyAIR G 3000 User s Guide 175 Appendix C Power over Ethernet Specifications...
Page 176: ...ZyAIR G 3000 User s Guide 177 Appendix D Brute Force Password Guessing Protection...
Page 188: ...ZyAIR G 3000 User s Guide 189 Appendix E Setting up Your Computer s IP Address...
Page 192: ...ZyAIR G 3000 User s Guide 193 Appendix F IP Address Assignment Conflicts...
Page 200: ...ZyAIR G 3000 User s Guide 201 Appendix G IP Subnetting...
Page 202: ...ZyAIR G 3000 User s Guide 203 Appendix H Command Interpreter...
Page 206: ...ZyAIR G 3000 User s Guide 207 Appendix I Log Descriptions...
Page 210: ...ZyAIR G 3000 User s Guide 211 Appendix J Wireless LAN and IEEE 802 11...