ZyXEL Communications AG-225H manual WPA-PSK/WPA2-PSK Application Example

Page 37

password approach makes WPA-PSK susceptible to brute-force password-guessing attacks but it’s still an improvement over WEP as it employs an easier-to-use, consistent, single, alphanumeric password.

2.2.4 WPA-PSK/WPA2-PSK Application Example

A WPA-PSK application looks as follows.

Step 1. First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters (including spaces and symbols).

Step 2. The AP checks each client’s password and (only) allows it to join the network if it matches its password.

Step 3. The AP derives and distributes keys to the wireless clients.

Step 4. The AP and wireless clients use the TKIP encryption process to encrypt data exchanged between them.

Figure 2-7 WPA-PSK/WPA2-PSK Authentication

2.2.5 WPA/WPA2 with RADIUS Application Example

You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA/WPA2 application example with an external RADIUS server looks as follows. “A” is the RADIUS server. “DS” is the distribution system.

Step 1. The AP passes the wireless client’s authentication request to the RADIUS server.

Step 2. The RADIUS server then checks the user's identification against its database and grants or denies network access accordingly.

Step 3. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the pair-wise key to dynamically generate unique

WLAN Networking

2-7

Image 37
Contents ZyXEL AG-225H Disclaimer Copyright 2005 by ZyXEL Communications CorporationTrademarks Online Registration ZyXEL Limited WarrantyFederal Communications Commission FCC Interference Statement Customer Support Spain Table of Contents Viii Table Of Contents Problem Connecting to an Access Point Syntax Conventions About This Users GuideRelated Documentation User Guide FeedbackGraphics Icons Key Page About Your ZyXEL AG-225H ZyXEL AG-225H Wi-Fi Finder User InterfaceUsing the ZyXEL Utility to Configure Your Network ZyXEL AG-225H Adapter Hardware and Utility InstallationLCM Description Basic OperationGetting Started Network Add ProfileZyXEL AG-225H User’s Guide Getting Started Remove Getting Started ZyXEL AG-225H User’s Guide Security Mode ZyXEL AG-225H User’s Guide Refresh Site SurveyDetail Info Connect Options Version ZyAIR ModesChange ZyAIR Modes Overview Wireless Network ApplicationSsid ChannelBSS Example Ad-Hoc IbssRoaming Infrastructure Network Example Access Point ModeRoaming Example Wireless LAN SecurityData Encryption with WEP EAP AuthenticationIeee 3 WPA/WPA2 User AuthenticationEncryption 5 WPA/WPA2 with Radius Application Example WPA-PSK/WPA2-PSK Application ExampleRTS/CTS Threshold Fragmentation ThresholdRTS Threshold Authentication TypeZyXEL AG-225H User’s Guide Introduction Additional Setup RequirementsProfile Screen Label Description ProfileHow to configure in Access Point Mode Add Wlan Networking ZyXEL AG-225H User’s Guide Remove MAC Filter MAC FilterWlan Networking Version Version Screen Chapter MaintenanceAbout Uninstalling the ZyXEL UtilityUpgrading the ZyXEL Utility Page Configuring WEP Configuring SecurityWireless Security Configuring WPA-PSK Configuring WPA2-PSK Problem with the Link Status Problems Starting the ZyXEL Utility ProgramTroubleshooting Starting ZyXEL Utility Program Troubleshooting Link QualityProblem Connecting to an Access Point Problems Communicating With Other ComputersTroubleshooting Communication Problems Troubleshooting Access Point Connection Problem