Reference Manual for the NETGEAR ProSafe Wireless Access Point 802.11g WG302
WPA Authentication:
Authentication via 802.1x/EAP and RADIUS
Wireless LAN
Wired Network with Optional 802.1x Port Based Network Access Control
|
|
|
|
|
|
|
|
|
|
|
|
|
| WPA enabled |
|
| |
| WPA |
|
| |||||
| enabled |
|
| Access Point |
|
| ||
| wireless |
|
|
| using |
|
|
|
| client with |
|
|
|
| |||
| “supplicant” |
|
| or |
|
| ||
|
|
|
|
| 802.1x |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Figure B-3: WPA Overview
TCP/IP
Ports Closed
Until
TCP/IP
Ports Opened
After
Authenticated
RADIUS Server
Login
Authentication
Certificate
Authority
(for
example
Win Server,
VeriSign)
IEEE 802.1x offers an effective framework for authenticating and controlling user traffic to a protected network, as well as providing a vehicle for dynamically varying data encryption keys via EAP from a RADIUS server, for example. This framework enables using a central authentication server, which employs mutual authentication so that a rogue wireless user does not join the network.
It is important to note that 802.1x does not provide the actual authentication mechanisms. When using 802.1x, the EAP type, such as Transport Layer Security
Note: For environments with a Remote Authentication
Together, these technologies provide a framework for strong user authentication.
Windows XP implements 802.1x natively, and several NETGEAR switch and wireless access point products support 802.1x.
Wireless Networking Basics |
September 2004