beautypg.com

Peap (protected eap), Leap, Wep encryption – ZyXEL Communications ZyXEL ZyWALL 5 User Manual

Page 580: Wep authentication steps

background image

ZyWALL 5 User’s Guide

Appendix F

579

PEAP (Protected EAP)

Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection,
then use simple username and password methods through the secured connection to
authenticate the clients, thus hiding client identity. However, PEAP only supports EAP
methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card),
for client authentication. EAP-GTC is implemented only by Cisco.

LEAP

LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE
802.1x.

WEP Encryption

WEP encryption scrambles the data transmitted between the wireless stations and the access
points to keep network communications private. It encrypts unicast and multicast
communications in a network. Both the wireless stations and the access points must use the
same WEP key.

WEP Authentication Steps

Three different methods can be used to authenticate wireless stations to the network: Open
System
, Shared Key, and Auto. The following figure illustrates the steps involved.