User Manual

Table Of Contents
In addition, user data is transmitted over the air without being encrypted, and
is subject to being intercepted by client stations anywhere within range that
want to eavesdrop on the wireless network.
Wireless network security requires attention to three main areas:
Authentication: Verifying that stations attempting to connect to the
network are authorized users before granting access to the network.
Encryption: Encrypting data that passes between the access point and
stations (to protect against interception and eavesdropping).
Key Management: Assigning unique data encryption keys to each wire-
less station session, and periodically changing the encryption keys to
minimize risk of their potential discovery.
Authentication
The two ways of authenticating users on the Access Point 10ag are:
MAC Authentication: Based on the user's wireless station MAC address.
802.1X Authentication: Based on the user credentials, such as; username/
password, digital certificates, etc.
MAC Authentication. MAC authentication of users can be done either
using a remote authentication server like a RADIUS server or by creating a
local database on the access point itself. MAC authentication is not as secure
as 802.1X authentication, as it is easy to decipher and spoof for unauthorized
network access.
802.1X Authentication. User 802.1X authentication can be implemented
either using a remote authentication server, such as a RADIUS server or by
using the local built-in RADIUS server on the access point itself. The user's
credentials are exchanged with the servers (both remote and local built-in)
using a mechanism called “Extensible Authentication Protocol (EAP)”. EAP
is a public-key encryption system to ensure that only authorized network users
can access the network. In wireless communications using EAP, a user
requests connection to a WLAN through an access point, which then requests
the identity of the user and transmits that identity to an authentication server
such as RADIUS. The server asks the access point for proof of identity, which
the access point gets from the user and sends back to the server to complete
the authentication. Local built-in RADIUS server supports only one EAP type
- PEAP-MSCHAPv2. For remote server authentication, the access point serves
as an intermediate authenticator to transparently pass any EAP type to the
remote server as specified in RFC3748.