Intel 3945ABG Network Card User Manual


 
An IP address is assigned for the dial-up client.
Accounting phase: Collects information on resource usage for the purpose of trend
analysis, auditing, session time billing, or cost allocation.
How 802.1x Authentication Works
A simplified description of 802.1x authentication is:
A client sends a "request to access" message to an access point. The access point
requests the identity of the client.
The client replies with its identity packet which is passed along to the authentication
server.
The authentication server sends an "accept" packet to the access point.
The access point places the client port in the authorized state and data traffic is
allowed to proceed.
802.1x Features
802.1x supplicant protocol support
Support for the Extensible Authentication Protocol (EAP) - RFC 2284
Supported Authentication Methods:
EAP TLS Authentication Protocol - RFC 2716 and RFC 2246
EAP Tunneled TLS (TTLS)
PEAP
Supports Microsoft Windows XP and Windows 2000
WPA or WPA2
Wi-Fi Protected Access (WPA or WPA2) is a security enhancement that strongly increases the
level of data protection and access control to a wireless network. WPA enforces 802.1x
authentication and key-exchange and only works with dynamic encryption keys. To
strengthen data encryption, WPA utilizes Temporal Key Integrity Protocol (TKIP). TKIP
provides important data encryption enhancements that include a per-packet key mixing
function, a message integrity check (MIC) called Michael an extended initialization vector
(IV) with sequencing rules, and a rekeying mechanism. With these improvement
enhancements, TKIP protects against WEP's known weaknesses.