ZyWALL 2 and ZyWALL 2WE

In order to ensure network security, the access point and the RADIUS server use a shared secret key, which is a password, they both know. The key is not sent over the network. In addition to the shared key, password information exchanged is also encrypted to protect the network from unauthorized access.

8.4.3Sequence for EAP Authentication

The following figure shows the authentication steps when you enable EAP and specify a RADIUS server on your access point.

Figure 8-3 Sequence for EAP Authentication

The steps below describe how the IEEE 802.1x EAP authentication works. Step 1. The wireless client sends a “request” message to the ZyWALL.

Step 2. The ZyWALL sends a “request” message to the wireless client for identity information. Step 3. The wireless client replies with the password and username information.

Step 4. The ZyWALL receives the message and repackets this information into an Access-Request package which is then sent to the remote RADIUS server (or the Authentication server).

Step 5. The RADIUS server checks the user information against its user profile database and sends an “accept” or a “deny” packet to the ZyWALL.

Step 6. When the ZyWALL receives the “accept” packet, the client port is placed into an authorized state and traffic is allowed to proceed. Otherwise, no traffic is allowed.

8.4.4Enable EAP Authentication on Your ZyWALL

Click Wireless and the 802.1X tab to display the Wireless LAN 802.1X Authentication screen.

Wireless LAN Security Setup

8-5