User's Manual
Table Of Contents
- Chapter 8 Troubleshooting
- Appendix A Technical Specifications
- Appendix B Network, Routing, Firewall, and Basics
- Appendix C Preparing Your Network
- What You Need To Use a Router with a Broadband Modem
- Preparing Your Computers for TCP/IP Networking
- Configuring Windows 95, 98, and Me for TCP/IP Networking
- Configuring Windows NT4, 2000 or XP for IP Networking
- Configuring the Macintosh for TCP/IP Networking
- Verifying the Readiness of Your Internet Account
- Restarting the Network
- Appendix D Wireless Networking Basics
- Glossary
- Index
Reference Manual for the 108 Mbps Wireless Firewall Router WGR624v3
Wireless Networking Basics D-13
June 2004 202-10036-01
Figure D-4: 802.1x Authentication Sequence
The AP sends Beacon Frames with WPA information element to the stations in the service set.
Information elements include the required authentication method (802.1x or Pre-shared key) and
the preferred cipher suite (WEP, TKIP, or AES). Probe Responses (AP to station) and Association
Requests (station to AP) also contain WPA information elements.
1. Initial 802.1x communications begin with an unauthenticated supplicant (i.e., client device)
attempting to connect with an authenticator (i.e., 802.11 access point). The client sends an
EAP-start message. This begins a series of message exchanges to authenticate the client.
2. The access point replies with an EAP-request identity message.
1
2
3
4
56
7
Client with a WPA-
enabled wireless
adapter and supplicant
(Win XP, Funk,
Meetinghouse, etc.)
For example, a
WPA-enabled AP
For example, a
RADIUS server