User’s Manual for the NETGEAR Double 108 Mbps Wireless PC Card
Wireless Network
Wired Network with Optional WPA 802.1x Port Based Network Access Control
|
|
|
|
|
|
|
|
|
|
|
|
|
| WPA enabled |
|
| |
| WPA |
|
| |||||
| enabled |
|
| Access Point |
|
| ||
| wireless |
|
|
| using |
|
|
|
| client with |
|
|
|
| |||
| “supplicant” |
|
| or |
|
| ||
|
|
|
|
| 802.1x/EAP |
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
TCP/IP
Ports Closed
Until
TCP/IP
Ports Opened
After
Authenticated
RADIUS Server
Login
Authentication
Optional
Certificate
Authority
(eg Win
Server,
VeriSign,
etc)
Figure B-5: WPA Overview
The strength WPA comes from an integrated sequence of operations that encompass 802.1X/EAP authentication and sophisticated key management and encryption techniques. Its major operations include:
•Network security capability determination. This occurs at the 802.11 level and is communicated through WPA information elements in Beacon, Probe Response, and (Re) Association Requests. Information in these elements includes the authentication method (802.1X or
The primary information conveyed in the Beacon frames is the authentication method and the cipher suite. Possible authentication methods include 802.1X and
•Authentication. EAP over 802.1X is used for authentication. Mutual authentication is gained by choosing an EAP type supporting this feature and is required by WPA. 802.1X port access control prevents full access to the network until authentication completes. 802.1X
Wireless Networking Basics |
August 2004