How 802.1x authentication works, 1x features, Wpa/wpa2 – Intel 3945ABG User Manual
Page 135: Wpa or wpa2, An ip address is assigned for the dial-up client, 1x supplicant protocol support, Supported authentication methods, Eap tunneled tls (ttls), Peap, Supports microsoft windows xp and windows 2000

An IP address is assigned for the dial-up client.
●
Accounting phase: Collects information on resource usage for the purpose of trend
analysis, auditing, session time billing, or cost allocation.
How 802.1x Authentication Works
A simplified description of 802.1x authentication is:
●
A client sends a "request to access" message to an access point. The access point
requests the identity of the client.
●
The client replies with its identity packet which is passed along to the authentication
server.
●
The authentication server sends an "accept" packet to the access point.
●
The access point places the client port in the authorized state and data traffic is
allowed to proceed.
802.1x Features
●
802.1x supplicant protocol support
●
Support for the Extensible Authentication Protocol (EAP) - RFC 2284
●
Supported Authentication Methods:
❍
EAP TLS Authentication Protocol - RFC 2716 and RFC 2246
❍
EAP Tunneled TLS (TTLS)
❍
PEAP
●
Supports Microsoft Windows XP and Windows 2000
WPA or WPA2
Wi-Fi Protected Access (WPA or WPA2) is a security enhancement that strongly increases the
level of data protection and access control to a wireless network. WPA enforces 802.1x
authentication and key-exchange and only works with dynamic encryption keys. To
strengthen data encryption, WPA utilizes Temporal Key Integrity Protocol (TKIP). TKIP
provides important data encryption enhancements that include a per-packet key mixing
function, a message integrity check (MIC) called Michael an extended initialization vector
(IV) with sequencing rules, and a rekeying mechanism. With these improvement
enhancements, TKIP protects against WEP's known weaknesses.