User Manual for the NETGEAR RangeMax™ Wireless USB 2.0 Adapter WPN111
The supplicant in the station uses the authentication and cipher suite information contained in the information elements to decide which authentication method and cipher suite to use. For example, if the access point is using the
•Key management. WPA features a robust key generation/management system that integrates the authentication and data privacy functions. Keys are generated after successful authentication and through a subsequent
•Data Privacy (Encryption). Temporal Key Integrity Protocol (TKIP) is used to wrap WEP in sophisticated cryptographic and security techniques to overcome most of its weaknesses.
•Data integrity. TKIP includes a message integrity code (MIC) at the end of each plaintext message to ensure messages are not being spoofed.
C lie n t with a W P A
su p p lica n t
F or e xa m p le , a W P A
F or e xa m p le , a R A D I U S se rve r
1
2
3
4
6 | 5 |
7
Figure B-6: WPA/802.1x Authentication Sequence
W ire le ss N e tworkin g B a sics | B |