![Acksys ETHERNET TO Wi-Fi GATEWAYS Скачать руководство пользователя страница 51](http://html1.mh-extra.com/html/acksys/ethernet-to-wi-fi-gateways/ethernet-to-wi-fi-gateways_user-manual_458121051.webp)
Page 51 / 141
DTUS065 rev A.7 – June 27, 2014
With the 802.11r, the temporally key is distributed through the back bone
between the different APs.
The WLn products support the 802.11r only in client mode.
The picture below explains the different steps of an 802.11r authentication:
Step 1: The Wi-Fi client does a full authentication with AP1. AP1 stores the
PMK and temporally keys. This full authentication process produces data
that will be stored by the Wi-Fi client for the next step.
Step 2: The Wi-Fi client roams on AP2 and uses data stored in the previous
step in its authentication request. With these data, AP2 knows that this Wi-Fi
client is successfully authenticated with AP1. AP2 directly requests the
temporally keys from AP1 (using the back bone). If AP1 gives all the
needed keys to AP2, the Wi-Fi client is allowed to finish the association
process with AP2. In the other case, the Wi-Fi client starts a full
authentication with AP2.