beautypg.com

Wep authentication steps, Peap (protected eap) leap, Figure 266 wep authentication steps – ZyXEL Communications 660HW Series User Manual

Page 401

background image

Prestige 660H/HW Series User’s Guide

Splitters and Microfilters

400

PEAP (Protected EAP)

Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection,
then use simple username and password methods through the secured connection to
authenticate the clients, thus hiding client identity. However, PEAP only supports EAP
methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card),
for client authentication. EAP-GTC is implemented only by Cisco.

LEAP

LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE
802.1x.

WEP Authentication Steps

Three different methods can be used to authenticate wireless stations to the network: Open
System
, Shared Key, and Auto. The following figure illustrates the steps involved.

Figure 266 WEP Authentication Steps

Open system authentication involves an unencrypted two-message procedure. A wireless
station sends an open system authentication request to the AP, which will then automatically
accept and connect the wireless station to the network. In effect, open system is not
authentication at all as any station can gain access to the network.

This manual is related to the following products: