An IP address is assigned for the dial-up client.
● Accounting phase: Collects information on resource usage for the purpose of trend
analysis, auditing, session time billing, or cost allocation.
How 802.1x Authentication Works
A simplified description of 802.1x authentication is:
● A client sends a "request to access" message to an access point. The access point
requests the identity of the client.
● The client replies with its identity packet which is passed along to the authentication
server.
● The authentication server sends an "accept" packet to the access point.
● The access point places the client port in the authorized state and data traffic is
allowed to proceed.
802.1x Features
● 802.1x supplicant protocol support
● Support for the Extensible Authentication Protocol (EAP) - RFC 2284
● Supported Authentication Methods:
❍ EAP TLS Authentication Protocol - RFC 2716 and RFC 2246
❍ EAP Tunneled TLS (TTLS)
❍ PEAP
● Supports Microsoft Windows XP and Windows 2000
WPA or WPA2
Wi-Fi Protected Access (WPA or WPA2) is a security enhancement that strongly increases the
level of data protection and access control to a wireless network. WPA enforces 802.1x
authentication and key-exchange and only works with dynamic encryption keys. To
strengthen data encryption, WPA utilizes Temporal Key Integrity Protocol (TKIP). TKIP
provides important data encryption enhancements that include a per-packet key mixing
function, a message integrity check (MIC) called Michael an extended initialization vector
(IV) with sequencing rules, and a rekeying mechanism. With these improvement
enhancements, TKIP protects against WEP's known weaknesses.