D-Link DWL-8500AP Product Manual - Page 49

IEEE 802.1X, key management. Extensible Authentication Protocol

Page 49 highlights

4 Configuring Access Point Security For this example, the administrator sets WEP key 3 in the wireless network properties of a Windows client. Figure 10. Providing a Wireless Client with a WEP Key Additional wireless clients also need to have one of the WEP keys defined on the AP. The administrator can assign the same WEP key that the first client has, or the administrator can give the second station a different WEP key (key 2, for example) so that the two stations cannot decrypt each other's transmissions. IEEE 802.1X IEEE 802.1X is the standard defining port-based authentication and infrastructure for doing key management. Extensible Authentication Protocol (EAP) messages are sent over an IEEE 802.11 wireless network using a protocol called EAP Encapsulation Over LANs (EAPOL). IEEE 802.1X provides dynamically-generated keys that are periodically refreshed. An RC4 stream cipher is used to encrypt the frame body and perform a cyclic redundancy check (CRC) on each 802.11 frame. This mode requires the use of an external RADIUS server to authenticate users. The access point requires a RADIUS server capable of EAP, such as the Microsoft Internet Authentication Server. To work with Windows clients, the authentication server must support Protected EAP (PEAP) and MSCHAP V2. You can use any of a variety of authentication methods that the IEEE 802.1X mode supports, including certificates, Kerberos, and public key authentication. You must configure the client stations to use the same authentication method the access point uses. Configuring Virtual Access Point Security 49

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168

Configuring Virtual Access Point Security
49
4
Configuring Access Point Security
For this example, the administrator sets WEP key 3 in the wireless network properties of a
Windows client.
Figure 10. Providing a Wireless Client with a WEP Key
Additional wireless clients also need to have one of the WEP keys defined on the AP. The
administrator can assign the same WEP key that the first client has, or the administrator can
give the second station a different WEP key (key 2, for example) so that the two stations
cannot decrypt each other’s transmissions.
IEEE 802.1X
IEEE 802.1X
is the standard defining port-based authentication and infrastructure for doing
key management. Extensible Authentication Protocol (
EAP
) messages are sent over an
IEEE
802.11
wireless network using a protocol called EAP Encapsulation Over LANs (EAPOL).
IEEE 802.1X provides dynamically-generated keys that are periodically refreshed. An RC4
stream cipher is used to encrypt the frame body and perform a cyclic redundancy check (CRC)
on each 802.11 frame.
This mode requires the use of an external RADIUS server to authenticate users. The access
point requires a RADIUS server capable of
EAP
, such as the Microsoft Internet
Authentication Server. To work with Windows clients, the authentication server must support
Protected EAP (PEAP) and
MSCHAP V2
.
You can use any of a variety of authentication methods that the IEEE 802.1X mode supports,
including certificates, Kerberos, and public key authentication. You must configure the client
stations to use the same authentication method the access point uses.