2.0 Adapter WG111
Client attempting to connect
802.11Authentication Shared Key Steps
1)Authentication request sent to AP
2) AP sends challenge text
3) Client encrypts challenge text and sends it back to AP
4)AP decrypts, and if correct, authenticates client
5)Client connects to network
Access Point (AP)
FVM318
Cable or
DLS modem
Before enabling | you |
require and the key |
|
available for 802.11 |
|
1. Do Not Use WEP: The 802.11 | the |
network uses Open System Authentication. |
|
2. Use WEP for Encryption: A transmitting 802.11 |
|
packet it sends using a configured WEP Key. The receiving 802. | using |
the same WEP Key. For authentication purposes, the 802.11b network |
|
Authentication. |
|
3. Use WEP for Authentication and Encryption: A transmitting 802.11 device | the data |
portion of every packet it sends using a configured WEP Key. The receiving 802.11 device decrypts the data using the same WEP Key. For authentication purposes, the 802.11 network uses Shared Key Authentication.
Note: Some 802.11 access points also support Use WEP for Authentication Only (Shared Key Authentication without data encryption).
Wireless Networking Basics |