4.2 Wireless Authentication Methods
Key Concepts
Understanding Wireless Authentication Methods involves grasping several key concepts:
- Pre-Shared Key (PSK)
- 802.1X with EAP
- MAC Address Filtering
- RADIUS Authentication
Pre-Shared Key (PSK)
Pre-Shared Key (PSK) is a simple and widely used method for wireless network authentication. In this method, a common password is shared between the wireless router and all client devices. When a device attempts to connect to the network, it must provide the correct PSK to gain access.
Example: Think of PSK as a secret handshake that only members of a club know. When someone new wants to join the club, they must perform the correct handshake to be let in.
802.1X with EAP
802.1X with Extensible Authentication Protocol (EAP) is a more secure method of wireless authentication. It involves a three-party authentication process between the client, the authentication server, and the wireless access point. EAP supports various authentication methods, such as EAP-TLS, EAP-TTLS, and PEAP.
Example: Consider 802.1X with EAP as a secure door with a guard. When someone arrives, the guard (authentication server) checks their credentials (certificate or username/password) before allowing them to enter the building (network).
MAC Address Filtering
MAC Address Filtering involves using the unique Media Access Control (MAC) address of each network device to control access to the wireless network. The router maintains a list of allowed MAC addresses, and only devices with matching addresses are permitted to connect.
Example: Think of MAC Address Filtering as a VIP list at a concert. Only those on the list (allowed MAC addresses) can enter the venue (network), ensuring that only authorized devices can connect.
RADIUS Authentication
Remote Authentication Dial-In User Service (RADIUS) is a network protocol used for centralized authentication, authorization, and accounting (AAA) management. RADIUS servers store user credentials and policies, and wireless access points forward authentication requests to the RADIUS server for verification.
Example: Consider RADIUS as a central security office in a large building. When someone wants to enter a specific room (network), they must first check in at the security office (RADIUS server) to verify their credentials before being granted access.