Lecture 2 WPA1, WPA2, 802.11i and beyond

Lecture 2 WPA1, - 7 Supplicant gets reply from the user and sends EAP-Response to AP AP sends to Radius Server as Radius-Access-Request with User

Info iconThis preview shows pages 1–10. Sign up to view the full content.

View Full Document Right Arrow Icon
802.11i and Beyond CIT 456 Spring 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Current 802 Security Standards
Background image of page 2
RC4 and WEP Refresher
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
WPA1, WPA2, 802.11i, Based on 802.1X and EAP
Background image of page 4
TKIP (WPA1 and WPA2)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
802.11i
Background image of page 6
802.1X Exchange on 802.11 1. Client (Supplicant) Associates to AP via Open Authentication (2 Frame Exchange) 2. Supplicant Sends 802.1X EAPOL-Start message (Optional) 3. AP issues and EAP-Request/Identity Frame 4. Supplicant Replies with EAP- Response/Identity Frame to AP. 5. AP passes EAP-Response/Identity Frame to Radius box as Radius-Access-Request Packet
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
6. Radius Server determines the type of Authentication required, sends EAP-Request for the Method as a Radius-Access-Challenge packet to the AP, which is passed on to the Supplicant.
Background image of page 8
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 10
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 7. Supplicant gets reply from the user and sends EAP-Response to AP. AP sends to Radius Server as Radius-Access-Request with User Response in the Data Field. (Steps 6 and 7 may take many times to complete the authentication…may be multiple steps, even 10 or 20 times). 8. Radius Server Grants Access with a Radius-Access-Accept Packet. This is Forwarded on from AP to EAP-Success frame and Authorizes port. 9. After EAP-Success, AP distributes Keys to Supplicant (Another process to be discussed later). 10.After Keys are installed on Supplicant, Data Frames MAY BE PASSED! DHCP may happen at this point. Key Management...
View Full Document

This note was uploaded on 02/29/2012 for the course CNIT 456 taught by Professor A.h.smith during the Spring '12 term at Purdue University-West Lafayette.

Page1 / 10

Lecture 2 WPA1, - 7 Supplicant gets reply from the user and sends EAP-Response to AP AP sends to Radius Server as Radius-Access-Request with User

This preview shows document pages 1 - 10. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online