O'Reilly logo

CCNP Wireless (642-737 IAUWS) Quick Reference by Jerome Henry

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2. Secure Client Devices

Wireless client protection combines authentication and data encryption mechanisms. As an IAUWS candidate, you should know both mechanisms in detail.

Configuring EAP Authentication

With Open System Authentication (no encryption), the client first sends a probe request (called active scanning) for a specific security set identifier (SSID) or all SSIDs (SSID field set to Null), and then receives a probe response from the wireless infrastructure mentioning the requested SSID (the SSID mentioned in the request, or all supported SSIDs if the SSID field was set to Null in the request). Alternatively, the client can listen to the access point (AP) beacons to learn the available SSIDs (called passive scanning).

After the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required