ZyAIR Access Point Series User’s Guide
6.2.2 Authentication
Three different methods can be used to authenticate wireless stations to the network: Open System, Shared Key, and Auto. The following figure illustrates the steps involved.
Wireless Station | Authentication | Access Point |
Open System Authentication
Open System Request
Authentication Acceptance
Shared Key Authentication
Shared Key Request
Challenge Text
Encrypted Challenge Text
Authentication Acceptance
Figure 6-2 WEP Authentication Steps
Open system authentication involves an unencrypted
Shared key authentication involves a
Wireless Security |