O'Reilly logo

CWSP® Certified Wireless Security Professional Official: Study Guide by Shawn M. Jackman, Bryan E. Harkins, David A. Westcott, David D. Coleman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Enterprise 802.11 Layer 2 Authentication Methods

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • WLAN authentication overview

  • AAA

    • Authentication

    • Authorization

    • Accounting

  • 802.1X

    • Supplicant

    • Authenticator

    • Authentication server

  • Supplicant credentials

    • Usernames and passwords

    • Digital certificates and PACs

    • One-time passwords

    • Smart cards and USB tokens

    • Machine authentication

    • Preshared keys

    • Proximity badges and RFID tags

    • Biometrics

  • Authentication server credentials

  • Shared secret

  • Legacy authentication protocols

    • PAP

    • CHAP

    • MSCHAP

    • MSCHAPv2

  • EAP

    • Weak EAP protocols

    • EAP-MD5

    • EAP-LEAP

    • Strong EAP protocols

    • EAP-PEAP

    • EAP-TTLS

    • EAP-TLS

    • EAP-FAST

    • Miscellaneous EAP protocols

    • EAP-SIM

    • EAP-AKA

Enterprise 802.11 Layer 2 Authentication Methods

WLAN ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required