beautypg.com

Peap (protected eap), Leap, Wep encryption – ZyXEL Communications 802.11g Wireless Firewall Router P-320W User Manual

Page 203: Wep authentication steps

background image

P-320W User’s Guide

Appendix F Wireless LANs

203

PEAP (Protected EAP)

Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection,
then use simple username and password methods through the secured connection to
authenticate the clients, thus hiding client identity. However, PEAP only supports EAP
methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card),
for client authentication. EAP-GTC is implemented only by Cisco.

LEAP

LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE
802.1x.

WEP Encryption

WEP encryption scrambles the data transmitted between the wireless stations and the access
points to keep network communications private. It encrypts unicast and multicast
communications in a network. Both the wireless stations and the access points must use the
same WEP key.

WEP Authentication Steps

Three different methods can be used to authenticate wireless stations to the network: Open
System
, Shared Key, and Auto. The following figure illustrates the steps involved.