Specifications

4-7
Cisco Aironet 1200 Series Access Point Software Configuration Guide
OL-2159-01
Chapter 4 Security Setup
Security Overview
Figure 4-3 Sequence for MAC-Based Authentication
OpenAllows any device to authenticate and then attempt to communicate
with the access point. Using open authentication, any wireless device can
authenticate with the access point, but the device can only communicate if its
WEP keys match the access points. Devices not using WEP do not attempt
to authenticate with an access point that is using WEP. Open authentication
does not rely on a RADIUS server on your network.
Figure 4-4 shows the authentication sequence between a device trying to
authenticate and an access point using open authentication. In this example,
the devices WEP key does not match the access points key, so it can
authenticate but not pass data.
Figure 4-4 Sequence for Open Authentication
Shared keyCisco provides shared key authentication to comply with the
IEEE 802.11b standard. However, because of shared keys security flaws, we
recommend that you avoid using it.
Access point
or bridge
Wired LAN
Client
device
Server
1. Authentication request
2. Identity request
3. MAC address
(relay to client)
(relay to server)
4. Successful authentication
65584
Access point
or bridge
with WEP key = 123
Client device
with WEP key = 321
1. Authentication request
2. Authentication response
54583