Cisco AIR-LAP1252AG-A-K9 Software Configuration Guide - Page 125
Sequence for MAC-Based Authentication, s key, so it can
UPC - 882658140716
View all Cisco AIR-LAP1252AG-A-K9 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 125 highlights
Chapter 4 Security Setup Security Overview Figure 4-3 Sequence for MAC-Based Authentication Wired LAN Client device 1. Authentication request 2. Identity request 3. MAC address (relay to client) Access point or bridge Server (relay to server) 4. Successful authentication 65584 • Open-Allows any device to authenticate and then attempt to communicate with the access point. Using open authentication, any wireless device can authenticate with the access point, but the device can only communicate if its WEP keys match the access point's. Devices not using WEP do not attempt to authenticate with an access point that is using WEP. Open authentication does not rely on a RADIUS server on your network. Figure 4-4 shows the authentication sequence between a device trying to authenticate and an access point using open authentication. In this example, the device's WEP key does not match the access point's key, so it can authenticate but not pass data. Figure 4-4 Sequence for Open Authentication Access point or bridge with WEP key = 123 1. Authentication request 2. Authentication response Client device with WEP key = 321 54583 • Shared key-Cisco provides shared key authentication to comply with the IEEE 802.11b standard. However, because of shared key's security flaws, we recommend that you avoid using it. OL-2159-03 Cisco Aironet 1200 Series Access Point Software Configuration Guide 4-7