G-3000H User’s Guide
Chapter 6 Wireless Security Configuration
69
The following figure shows an overview of authentication when you specify a RADIUS server
on your access point.
Figure 27
EAP Authentication
The details below provide a general description of how IEEE 802.1x EAP authentication
works. For an example list of EAP-MD5 authentication steps, see the IEEE 802.1x appendix.
1
The wireless station sends a “start” message to the ZyAIR.
2
The ZyAIR sends a “request identity” message to the wireless station for identity
information.
3
The wireless station replies with identity information, including username and password.
4
The RADIUS server checks the user information against its user profile database and
determines whether or not to authenticate the wireless station.
6.5 Dynamic WEP Key Exchange
The AP maps a unique key that is generated with the RADIUS server. This key expires when
the wireless connection times out, disconnects or reauthentication times out. A new WEP key
is generated each time reauthentication is performed.
To use Dynamic WEP, enable and configure the RADIUS server and enable one of the
Dynamic WEP
Security Modes
in the
Security
screen. Ensure that the wireless station’s EAP
type is configured to one of the following:
• EAP-TLS
• EAP-TTLS
• PEAP
Note:
EAP-MD5 cannot be used with dynamic WEP key exchange.
6.6 Introduction to WPA
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. Key differences
between WPA and WEP are user authentication and improved data encryption.
Summary of Contents for ZyAIR G-3000H
Page 1: ...G 3000H 802 11g Wireless Access Point User s Guide Version 3 50 1 2006 ...
Page 22: ...G 3000H User s Guide 22 List of Figures ...
Page 26: ...G 3000H User s Guide 26 List of Tables ...
Page 114: ...G 3000H User s Guide 114 Chapter 9 VLAN ...
Page 134: ...G 3000H User s Guide 134 Chapter 11 Certificates ...
Page 164: ...G 3000H User s Guide 164 Chapter 15 Introducing the SMT ...
Page 180: ...G 3000H User s Guide 180 Chapter 17 LAN Setup ...
Page 218: ...G 3000H User s Guide 218 Chapter 24 System Maintenance and Information ...
Page 224: ...G 3000H User s Guide 224 Appendix C Power over Ethernet PoE Specifications ...
Page 226: ...G 3000H User s Guide 226 Appendix D Brute Force Password Guessing Protection ...
Page 238: ...G 3000H User s Guide 238 Appendix E Setting up Your Computer s IP Address ...
Page 242: ...G 3000H User s Guide 242 Appendix F IP Address Assignment Conflicts ...
Page 254: ...G 3000H User s Guide 254 Appendix G Wireless LANs ...
Page 262: ...G 3000H User s Guide 262 Appendix H IP Subnetting ...
Page 264: ...G 3000H User s Guide 264 Appendix I Command Interpreter ...
Page 268: ...G 3000H User s Guide 268 Appendix J Log Descriptions ...
Page 272: ...G 3000H User s Guide 272 Appendix L Power Adaptor Specifications ...
Page 280: ...G 3000H User s Guide 280 Appendix M Text File Based Auto Configuration ...
Page 294: ...G 3000H User s Guide 294 Appendix N Wireless LAN Manager ...
Page 299: ...G 3000H User s Guide Index 299 ZyNOS F W Version 196 zyxel prowireless mib 287 ...