User's Manual
Security Overview
described as follows:
● Authentication phase: Verifies a user name and password against a local database. After the
credentials are verified, the authorization process begins.
● Authorization phase: Determines whether a request is allowed access to a resource. An IP address is
assigned for the Dial-Up client.
● Accounting phase: Collects information on resource usage for the purpose of trend analysis, auditing,
session time billing, or cost allocation
How 802.1x authentication works
A simplified description of the 802.1x authentication is:
1. A client sends a "request to access" message to an access point. The access point requests the identity
of the client.
2. The client replies with its identity packet which is passed along to the authentication server.
3. The authentication server sends an "accept" packet to the access point.
4. The access point places the client port in the authorized state and data traffic is allowed to proceed.
802.1x features
● 802.1x supplicant protocol support
● Support for the Extensible Authentication Protocol (EAP) - RFC 2284
● Supported Authentication Methods:
● MD5 - RFC 2284
● EAP TLS Authentication Protocol - RFC 2716 and RFC 2246
● EAP Tunneled TLS (TTLS)
● Cisco LEAP
● EAP-FAST
● EAP-SIM
● PEAP
● Supports Windows XP, 2000
Refer to
Security Settings for more information.
WPA/WPS2
Wi-Fi Protected Access (WPA/WPA2) is a security enhancement that strongly increases the level of data
file:///C|/CX2%20Muroc%20UG/6-15-04/security.htm (3 of 6) [6/15/2004 3:40:11 PM]