680077
149
Zoom out
Zoom in
Previous page
1/183
Next page
Appendix D Wireless LANs
FSG1100HN User’s Guide
149
However, MD5 authentication has some weaknesses. Since the
authentication server needs to get the plaintext passwords, the passwords
must be stored. Thus someone other than the authentication server may
access the password file. In addition, it is possible to impersonate an
authentication server as MD5 authentication method does not perform mutual
authentication. Finally, MD5 authentication method does not support data
encryption with dynamic session key. You must configure WEP encryption
keys for data encryption.
EAP-TLS (Transport Layer Security)
With EAP-TLS, digital certifications are needed by both the server and the
wireless stations for mutual authentication. The server presents a certificate to
the client. After validating the identity of the server, the client sends a different
certificate to the server. The exchange of certificates is done in the open
before a secured tunnel is created. This makes user identity vulnerable to
passive attacks. A digital certificate is an electronic ID card that authenticates
the sender’s identity. However, to implement EAP-TLS, you need a Certificate
Authority (CA) to handle certificates, which imposes a management overhead.
EAP-TTLS (Tunneled Transport Layer Service)
EAP-TTLS is an extension of the EAP-TLS authentication that uses
certificates for only the server-side authentications to establish a secure
connection. Client authentication is then done by sending username and
password through the secure connection, thus client identity is protected. For
client authentication, EAPTTLS supports EAP methods and legacy
authentication methods such as PAP, CHAP, MS-CHAP and MS-CHAP v2.
PEAP (Protected EAP)
Like EAP-TTLS, server-side certificate authentication is used to establish a
secure connection, then use simple username and password methods
through the secured connection to authenticate the clients, thus hiding client
identity. However, PEAP only supports EAP methods, such as EAP-MD5,
EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client
authentication. EAP-GTC is implemented only by Cisco.
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco
implementation of IEEE 802.1X.
Dynamic WEP Key Exchange
The AP maps a unique key that is generated with the RADIUS server. This
key expires when the wireless connection times out, disconnects or
reauthentication times out. A new WEP key is generated each time
reauthentication is performed.
149


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for ZyXEL FSG1100HN at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of ZyXEL FSG1100HN in the language / languages: English as an attachment in your email.

The manual is 5,27 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

Others manual(s) of ZyXEL FSG1100HN

ZyXEL FSG1100HN Quick start guide - English - 18 pages


The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info