beautypg.com

Peap (protected eap), Leap, Wep encryption – ZyXEL Communications 70 Series User Manual

Page 716: Wep authentication steps

background image

ZyWALL 5/35/70 Series User’s Guide

Appendix H Wireless LANs

716

PEAP (Protected EAP)

Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection,
then use simple username and password methods through the secured connection to
authenticate the clients, thus hiding client identity. However, PEAP only supports EAP
methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card),
for client authentication. EAP-GTC is implemented only by Cisco.

LEAP

LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE
802.1x.

WEP Encryption

WEP encryption scrambles the data transmitted between the wireless stations and the access
points to keep network communications private. It encrypts unicast and multicast
communications in a network. Both the wireless stations and the access points must use the
same WEP key.

WEP Authentication Steps

Three different methods can be used to authenticate wireless stations to the network: Open
System
, Shared Key, and Auto. The following figure illustrates the steps involved.

This manual is related to the following products: