Chapter 4. Enterprise 802.11 Layer 2 Authentication Methods

IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:

  • WLAN authentication overview

  • AAA

    • Authentication

    • Authorization

    • Accounting

  • 802.1X

    • Supplicant

    • Authenticator

    • Authentication server

  • Supplicant credentials

    • Usernames and passwords

    • Digital certificates and PACs

    • One-time passwords

    • Smart cards and USB tokens

    • Machine authentication

    • Preshared keys

    • Proximity badges and RFID tags

    • Biometrics

  • Authentication server credentials

  • Shared secret

  • Legacy authentication protocols

    • PAP

    • CHAP

    • MSCHAP

    • MSCHAPv2

  • EAP

    • Weak EAP protocols

    • EAP-MD5

    • EAP-LEAP

    • Strong EAP protocols

    • EAP-PEAP

    • EAP-TTLS

    • EAP-TLS

    • EAP-FAST

    • Miscellaneous EAP protocols

    • EAP-SIM

    • EAP-AKA

Enterprise 802.11 Layer 2 Authentication Methods

WLAN ...

Get CWSP® Certified Wireless Security Professional Official: Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.