-57-
APPENDIX C: 802.1x Authentication Setup
There are three essential components to the 802.1x infrastructure: (1) Supplicant, (2)
Authe nticator and (3) Server. The 802.1x security supports both MD5 and TLS Extensive
Authentication Protocol (EAP). The 802.1x Authentication is a complement to the current WEP
encryption used in wireless network. The current security weakness of WEP encryp tion is that
there is no key management and no limitation for the duration of key lifetime. 802.1x
Authentication offers key management, which includes key per user and key per session, and
limits the lifetime of the keys to certain duration. Thus, key decryption by unauthorized
attacker becomes extremely difficult, and the wireless network is safely secured. We will
introduce the 802.1x Authentication infrastructure as a whole and going into details of the setup
for each essential component in 802.1x authentication.
802.1x Authentication Infrastructure
The Infrastructure diagram showing above illustrates that a group of 802.11 wireless clients is
trying to form a 802.11 wireless network with the Access Point in order to have access to the
Internet/Intranet. In 802.1x authentication infrastructure, each of these wireless clients would
have to be authenticated by the Radius server, which would grant the authorized client and
notified the Access Point to open up a communication port to be used for the granted client.
There are 2 Extensive Authentication Protocol (EAP) methods supported: (1) MD5 and (2) TLS.
802.11 Wireless
Access Points
Support 802.1X
RADIUS
Server
Authentication Request
Internet/
Intranet
Authentication Success
802.11 Wireless
Clients
Support 802.1X
Public
802.11
Wireless
Networks
Содержание WAP-0003
Страница 1: ...1 LevelOne WAP 0003 54Mbps Wireless Access Point User s Manual V 1 0...
Страница 26: ...26 when LevelOne Access Point re operates after it restarts...
Страница 28: ...28 4 Click Install on the menu bar to proceed with 54M AP installation...
Страница 30: ...30 Installation wizard copies the utility program files in your PC 5 Click Finish to complete the installation...
Страница 64: ...64 16 Now we are connected to the Certificate Service Select Request a certificate and click Next to continue...
Страница 65: ...65 17 Select User Certificate request and click Next to continue...
Страница 66: ...66 18 Click Submit to continue...
Страница 67: ...67 19 The Certificate Service is now processing the certificate request...
Страница 83: ...83 23 Select Internet Authentication Service and click OK to install...
Страница 88: ...88 33 Click Edit Profile to open up...
Страница 93: ...93 41 Select Group Policy tab and click Edit to edit the Group Policy...
Страница 96: ...96 46 Go to Account tab and enable Store password using reversible encryption 47 Click OK to continue...