beautypg.com

Peap (protected eap), Leap, Wep authentication steps – ZyXEL Communications P-335WT User Manual

Page 485: Figure 312 wep authentication steps

background image

P-335 Series User’s Guide

Appendix I Wireless LANs

485

PEAP (Protected EAP)

Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection,
then use simple username and password methods through the secured connection to
authenticate the clients, thus hiding client identity. However, PEAP only supports EAP
methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card),
for client authentication. EAP-GTC is implemented only by Cisco.

LEAP

LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE
802.1x.

WEP Authentication Steps

Three different methods can be used to authenticate wireless stations to the network: Open
System
, Shared Key, and Auto. The following figure illustrates the steps involved.

Open system authentication involves an unencrypted two-message procedure. A wireless
station sends an open system authentication request to the AP, which will then automatically
accept and connect the wireless station to the network. In effect, open system is not
authentication at all as any station can gain access to the network.