EasyManuals Logo

NETGEAR WGU624 User Manual

NETGEAR WGU624
178 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #158 background imageLoading...
Page #158 background image
Reference Manual for the Double 108 Mbps Wireless Firewall Router WGU624
D-14 Wireless Networking Basics
M-10153-01
3. The client sends an EAP-response packet containing the identity to the authentication server.
The access point responds by enabling a port for passing only EAP packets from the client to
an authentication server located on the wired side of the access point. The access point blocks
all other traffic, such as HTTP, DHCP, and POP3 packets, until the access point can verify the
client's identity using an authentication server (for example, RADIUS).
4. The authentication server uses a specific authentication algorithm to verify the client's identity.
This could be through the use of digital certificates or some other EAP authentication type.
5. The authentication server will either send an accept or reject message to the access point.
6. The access point sends an EAP-success packet (or reject packet) to the client.
7. If the authentication server accepts the client, then the access point will transition the client's
port to an authorized state and forward additional traffic.
The important part to know at this point is that the software supporting the specific EAP type
resides on the authentication server and within the operating system or application “supplicant”
software on the client devices. The access point acts as a “pass through” for 802.1x messages,
which means that you can specify any EAP type without needing to upgrade an 802.1x-compliant
access point. As a result, you can update the EAP authentication type to such devices as token
cards (Smart Cards), Kerberos, one-time passwords, certificates, and public key authentication, or
as newer types become available and your requirements for security change.
WPA Data Encryption Key Management
With 802.1x, the rekeying of unicast encryption keys is optional. Additionally, 802.11 and 802.1x
provide no mechanism to change the global encryption key used for multicast and broadcast
traffic. With WPA, rekeying of both unicast and global encryption keys is required.
For the unicast encryption key, the Temporal Key Integrity Protocol (TKIP) changes the key for
every frame, and the change is synchronized between the wireless client and the wireless access
point (AP). For the global encryption key, WPA includes a facility (the Information Element) for
the wireless AP to advertise the changed key to the connected wireless clients.
If configured to implement dynamic key exchange, the 802.1x authentication server can return
session keys to the access point along with the accept message. The access point uses the session
keys to build, sign and encrypt an EAP key message that is sent to the client immediately after
sending the success message. The client can then use contents of the key message to define
applicable encryption keys. In typical 802.1x implementations, the client can automatically change
encryption keys as often as necessary to minimize the possibility of eavesdroppers having enough
time to crack the key in current use.

Table of Contents

Other manuals for NETGEAR WGU624

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the NETGEAR WGU624 and is the answer not in the manual?

NETGEAR WGU624 Specifications

Power IconPower
power adapter voltage5V
power adapter current2.8 A
Networking and Connectivity IconNetworking and Connectivity
network standardsIEEE 802.11b, IEEE 802.11g, IEEE 802.11a
portsFive10/100 (1 Internet, & 4 LAN) ports
operating frequencies2.4 GHz and 5.0 GHz
Weight and Dimensions IconWeight and Dimensions
dimensions6.9 x 1.1 x 4.7 in (175.3 x 27.94 x 119.4 mm)
weight.7 lbs (.3 kg)
max range (indoor)400 ft

Related product manuals