Chapter 4. Enterprise 802.11 Layer 2 Authentication Methods
IN THIS CHAPTER, YOU WILL LEARN ABOUT THE FOLLOWING:
WLAN authentication overview
AAA
Authentication
Authorization
Accounting
802.1X
Supplicant
Authenticator
Authentication server
Supplicant credentials
Usernames and passwords
Digital certificates and PACs
One-time passwords
Smart cards and USB tokens
Machine authentication
Preshared keys
Proximity badges and RFID tags
Biometrics
Authentication server credentials
Shared secret
Legacy authentication protocols
PAP
CHAP
MSCHAP
MSCHAPv2
EAP
Weak EAP protocols
EAP-MD5
EAP-LEAP
Strong EAP protocols
EAP-PEAP
EAP-TTLS
EAP-TLS
EAP-FAST
Miscellaneous EAP protocols
EAP-SIM
EAP-AKA
WLAN ...
Get CWSP® Certified Wireless Security Professional Official: Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.