
G-3000H User’s Guide
Appendix G Wireless LANs
249
• Access-Challenge
Sent by a RADIUS server requesting more information in order to allow access. The
access point sends a proper response from the user and then sends another Access-
Request message.
The following types of RADIUS messages are exchanged between the access point and the
RADIUS server for user accounting:
• Accounting-Request
Sent by the access point requesting accounting.
• Accounting-Response
Sent by the RADIUS server to indicate that it has started or stopped accounting.
In order to ensure network security, the access point and the RADIUS server use a shared
secret key, which is a password, they both know. The key is not sent over the network. In
addition to the shared key, password information exchanged is also encrypted to protect the
network from unauthorized access.
Types of Authentication
This appendix discusses some popular authentication types:
EAP-MD5
,
EAP-TLS
,
EAP-
TTLS
,
PEAP
and
LEAP
.
The type of authentication you use depends on the RADIUS server or the AP. Consult your
network administrator for more information.
EAP-MD5 (Message-Digest Algorithm 5)
MD5 authentication is the simplest one-way authentication method. The authentication server
sends a challenge to the wireless station. The wireless station ‘proves’ that it knows the
password by encrypting the password with the challenge and sends back the information.
Password is not sent in plain text.
However, MD5 authentication has some weaknesses. Since the authentication server needs to
get the plaintext passwords, the passwords must be stored. Thus someone other than the
authentication server may access the password file. In addition, it is possible to impersonate an
authentication server as MD5 authentication method does not perform mutual authentication.
Finally, MD5 authentication method does not support data encryption with dynamic session
key. You must configure WEP encryption keys for data encryption.
Summary of Contents for ZyAIR G-3000H
Page 1: ...G 3000H 802 11g Wireless Access Point User s Guide Version 3 50 1 2006 ...
Page 22: ...G 3000H User s Guide 22 List of Figures ...
Page 26: ...G 3000H User s Guide 26 List of Tables ...
Page 114: ...G 3000H User s Guide 114 Chapter 9 VLAN ...
Page 134: ...G 3000H User s Guide 134 Chapter 11 Certificates ...
Page 164: ...G 3000H User s Guide 164 Chapter 15 Introducing the SMT ...
Page 180: ...G 3000H User s Guide 180 Chapter 17 LAN Setup ...
Page 218: ...G 3000H User s Guide 218 Chapter 24 System Maintenance and Information ...
Page 224: ...G 3000H User s Guide 224 Appendix C Power over Ethernet PoE Specifications ...
Page 226: ...G 3000H User s Guide 226 Appendix D Brute Force Password Guessing Protection ...
Page 238: ...G 3000H User s Guide 238 Appendix E Setting up Your Computer s IP Address ...
Page 242: ...G 3000H User s Guide 242 Appendix F IP Address Assignment Conflicts ...
Page 254: ...G 3000H User s Guide 254 Appendix G Wireless LANs ...
Page 262: ...G 3000H User s Guide 262 Appendix H IP Subnetting ...
Page 264: ...G 3000H User s Guide 264 Appendix I Command Interpreter ...
Page 268: ...G 3000H User s Guide 268 Appendix J Log Descriptions ...
Page 272: ...G 3000H User s Guide 272 Appendix L Power Adaptor Specifications ...
Page 280: ...G 3000H User s Guide 280 Appendix M Text File Based Auto Configuration ...
Page 294: ...G 3000H User s Guide 294 Appendix N Wireless LAN Manager ...
Page 299: ...G 3000H User s Guide Index 299 ZyNOS F W Version 196 zyxel prowireless mib 287 ...