16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

582 Chapter 21<br />

21.8.5 Understanding and Configuring 802.1X RADIUS Authentication<br />

●<br />

●<br />

●<br />

RADIUS provides for centralized authentication and accounting.<br />

802.1X provides for a method of port-based authentication to LAN ports in a<br />

switched network environment.<br />

For 802.1X authentication to work on a wireless network, the AP must be able<br />

to securely identify traffic from a particular wireless client. This identification is<br />

accomplished using authentication keys that are sent to the AP and the wireless<br />

client from the RADIUS server.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!