ZyXEL Communications AG-200 manual WPA with Radius Application Example, WPA-PSK Authentication

Page 39

ZyXEL AG-200 User’s Guide

Step 4. The AP and wireless clients use the TKIP encryption process to encrypt data exchanged between them.

Figure 2-6 WPA-PSK Authentication

2.2.5 WPA with RADIUS Application Example

You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA application example with an external RADIUS server looks as follows. “A” is the RADIUS server. “DS” is the distribution system.

Step 1. The AP passes the wireless client’s authentication request to the RADIUS server.

Step 2. The RADIUS server then checks the user's identification against its database and grants or denies network access accordingly.

Step 3. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the pair-wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients.

WLAN Networking

2-7

Image 39
Contents ZyXEL AG-200 Copyright 2004 by ZyXEL Communications Corporation DisclaimerTrademarks Online Registration ZyXEL Limited WarrantyFCC Statement Customer Support Table of Contents ZyXEL AG-200 User’s Guide User Guide Feedback About This Users GuideSyntax Conventions Related DocumentationGraphics Icons Key Page ZyXEL AG-200 Hardware and Utility Installation Using the ZyXEL Utility to Configure Your NetworkAbout Your ZyXEL AG-200 ZyXEL AG-200 User’s Guide Network Add ProfileZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide Remove ApplyProperties Each page in Properties is explained below ZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide Security Mode ZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide ZyXEL AG-200 User’s Guide Site Survey RefreshStrong Scan Detail Info Add to profile ConnectAuto-Profile Selection OptionsLaunch at windows startup Auto Dhcp renewalZyXEL AG-200 User’s Guide Getting Started Version Page Channel Wireless Network ApplicationOverview SsidBSS Example Ad-Hoc IbssInfrastructure Network Example RoamingRoaming Example Wireless LAN Security3 WPA EAP AuthenticationData Encryption with WEP IeeeUser Authentication WPA-PSK Application ExampleEncryption WPA with Radius Application Example WPA-PSK AuthenticationRTS/CTS Threshold Fragmentation ThresholdRTS Threshold Authentication TypeZyXEL AG-200 User’s Guide Version Screen Chapter MaintenanceAbout Uninstalling the ZyXEL UtilityUpgrading the ZyXEL Utility Page Configuring WEP Configuring SecurityZyXEL AG-200 User’s Guide Configuring WPA-PSK Configuring WPA ConfiguringConfiguring 802.1x EAP-MD5 Configuring 802.1x EAP-PEAP Configuring 802.1x EAP-LEAPZyXEL AG-200 User’s Guide Configuring 802.1x EAP-TLS ZyXEL AG-200 User’s Guide Configuring 802.1x EAP-TTLS ZyXEL AG-200 User’s Guide Troubleshooting Link Quality Problems Starting the ZyXEL Utility ProgramProblem with the Link Status Troubleshooting Starting ZyXEL Utility ProgramTroubleshooting Communication Problems Problems Communicating With Other ComputersPeap Protected EAP EAP-TTLS Tunneled Transport Layer ServiceEAP-MD5 Message-Digest Algorithm EAP-TLS Transport Layer SecurityLeap Comparison of EAP Authentication Types
Related manuals
Manual 2 pages 60.26 Kb