Chapter 4 Wireless Technology
177
Extensible
Authentication
Protocol (EAP)
a protocol that
ensures authorized
access to the network
system and network
resources. It is used
on both wired and
wireless network
systems.
the air, making it possible for anyone with a standard wireless network card to
intercept the radio waves.
Radio waves fi ll the building areas and areas outside the building. One of the
most common building materials used today is glass, especially in commercial
establishments. Windows do not limit radio wave transmissions. Anyone near
a building that uses wireless devices can easily intercept the wireless network
signals with a laptop equipped with a wireless network adapter. However,
security features can be implemented that will secure the transmission.
This section covers common wireless security features and provides a brief
overview of wireless security. A more in-depth exploration of security features,
such as encryption methods, authentication, and security standards are covered
in Chapter 15⎯Network Security.
802.1x Authentication
IEEE 802.1x is a draft standard for authentication methods for wireless
networking. It is referred to as a draft standard because it is not complete. The
802.1x draft standard provides a means for a client and server to authenticate
with each other. Authentication is typically achieved through the exchange of a
user name and password based on the Extensible Authentication Protocol (EAP).
The Extensible Authentication Protocol (EAP) is used for both wired and
wireless network systems. EAP ensures authorized access to the network system
and network resources. The improved version of EAP is called PEAP, which
represents Protected EAP.
Look at Figure 4-27, which shows the
WLAN
properties,
Authentication
page
in Windows XP. Notice that the
Enable IEEE 802.1x authentication for this network
option has been selected and note the
EAP type
options, such as
Protected EAP
(PEAP)
and
Smart Card or other Certifi
cate. The computer is authenticated, not
the person using the computer. A person who has their password compromised
could have their password used to access a wireless network. However, when
confi gured to authenticate the computer, an intruder would have to use the
computer to access the wireless network.
Figure 4-27.
Windows XP
WLAN
properties,
Authentication
page.
Extensible
Authentication
Protocol (EAP) types
Computer is
selected to be
authenticated
IEEE 802.1x
authentication
is enabled