WNC-0300 54 / 108 Mbps Wireless PCI Adapter Bruger manual Version 2.0
LevelOne WNC-0300 54 / 108 Mbps Wireless PCI Adapter Bruger ... LevelOne WNC-0300 54 / 108 Mbps Wireless PCI Adapter Bruger ...
Vælg “Brug følgende IPadresse” Skriv en IP adresse og undernet maske. I DNS Konfiguration fanen, (1) skriv IP adressen på din router i Standard gateway. (2) Skriv IP adressen på din router i DNS server 42
APPENDIX C: 802.1x Genkendelse Der er tre essentielle komponenter i 802.1x infrastructure: (1) Ansøger, (2) Genkender og (3) Server. 802.1x sikkerheden understøtter både MD5 og TLS Extensive Authentication Protocol (EAP). 802.1x Genkendelsen er en udvidelse af den nuværende WEP kryptering som bruges i trådløse netværk. WEP krypteringens svaghed er at der ikke er en nøgleadministration eller en begrænsning for en nøgles levetid. 802.1x Genkendelse tilbyder nøgle-administration, hvilket inkluderer nøgle pr. bruger og pr. Session, og en begrænset levetid for nøgler. Derved bliver nøgle dekryptering af uberettigede angribere ekstremt besværligt, og det trådløse netværk er sikret. Vi vil introducere 802.1x Genkendelsens infrastruktur som en helhed og gå ind i detaljer omkring opsætning for hver fundamental komponent i 802.1x Genkendelsen. 802.1x Genkendelse Infrastruktur The Infrastructure diagram showing above illustrates that a group of 802.11 wireless clients is trying to form a 802.11 wireless network with the Access Point in order to have access to the Internet/Intranet. In 802.1x authentication infrastructure, each of these wireless clients would have to be authenticated by the Radius server, which would grant the authorized client and notified the Access Point to open up a communication port to be used for the granted client. There are 2 Extensive Authentication Protocol (EAP) methods supported: (1) MD5 and (2) TLS. MD5 authentication is simply a validation of existing user account and password that is stored in the server with what are keyed in by the user. Therefore, wireless client user will be prompted for account/password validation every time when he/she is trying to get connected. TLS authentication is a more complicated authentication, which involves using certificate that is issued by the Radius server, for authentication. TLS authentication is a more secure authentication, since not only the Radius server authenticates the wireless client, but also the client can validate the Radius server by the certificate that it issues. The authentication request from wireless clients and reply by the Radius Server and Access Point process can be briefed as follows: 1. The client sends an EAP start message to the Access Point 2. The Access Point replies with an EAP Request ID message 43
- Page 1 and 2: LevelOne WNC-0300 54 / 108 Mbps Wir
- Page 3 and 4: Indholdsfortegnelse. Introduktion 4
- Page 5 and 6: KOM I GANG Lær LevelOne WNC-0300 A
- Page 7 and 8: Installér dit LevelOne WNC-0300 Ut
- Page 9 and 10: Klik “Next” for at starte insta
- Page 11 and 12: Ovenstående billede fremkommer nå
- Page 13 and 14: Konf iguration Denne side benyttes
- Page 15 and 16: vet i IEEE Std 802.11b). Hos modtag
- Page 17 and 18: Available Network - vis de trådlø
- Page 19 and 20: Denne side viser noget information
- Page 21 and 22: Klik på ”Hardware” 21
- Page 23 and 24: Højre-klik på den trådløse netv
- Page 25 and 26: Gå til Start menu > Kontrolpanel >
- Page 27 and 28: 1. Skriv en kort beskrivelse for di
- Page 29 and 30: Du kan oprette en netværks diskett
- Page 31 and 32: Klik “Færdig” for at afslutte
- Page 33 and 34: Skriv cmd, “ipconfig /renew” i
- Page 35 and 36: Dynamisk Tildelt IP Adresse 35
- Page 37 and 38: Trådløst Netværk Under Windows 2
- Page 39 and 40: Vælg “Brug følgende IPadresse
- Page 41: TCP/IP egenskabs vinduet kommer fre
- Page 45 and 46: 5. Click on the “Wireless Network
- Page 47 and 48: TLS Authentication 7. Select “The
- Page 49 and 50: 14. Enter your user name and passwo
- Page 51 and 52: 19. The Certificate Service is now
- Page 53 and 54: 23. Windows XP will prompt you to s
- Page 55 and 56: Please note that that value of Netw
- Page 57 and 58: Authenticator: Wireless Network Acc
- Page 59 and 60: 5. Select “Enterprise root CA”,
- Page 61 and 62: 12. Right-click on domain, and sele
- Page 63 and 64: 17. The Automatic Certificate Reque
- Page 65 and 66: 25. Right-click “Client”, and s
- Page 67 and 68: 31. Unless you want to specify the
- Page 69 and 70: For TLS Authentication Setup (Steps
- Page 71 and 72: 38. Go to the “Dial-in” tab, an
- Page 73 and 74: 41. Select “Group Policy” tab,
- Page 75 and 76: 45. Go to Users. Right-click on the
- Page 77 and 78: 51. Right-click “MD5”, and sele
- Page 79 and 80: 1. Open System : Genkendelse som å
- Page 81 and 82: Kryptering ~ En sikkerheds metode s
- Page 83: Interface PCI Standard v2.2 Power V
APPENDIX C: 802.1x Genkendelse<br />
Der er tre essentielle komponenter i 802.1x infrastructure: (1) Ansøger, (2) Genkender og (3) Server.<br />
802.1x sikkerheden understøtter både MD5 og TLS Extensive Authentication Protocol (EAP). 802.1x<br />
Genkendelsen er en udvidelse af den nuværende WEP kryptering som bruges i trådløse netværk. WEP<br />
krypteringens svaghed er at der ikke er en nøgleadministration eller en begrænsning for en nøgles levetid.<br />
802.1x Genkendelse tilbyder nøgle-administration, hvilket inkluderer nøgle pr. bruger og pr. Session,<br />
og en begrænset levetid for nøgler. Derved bliver nøgle dekryptering af uberettigede angribere ekstremt<br />
besværligt, og det trådløse netværk er sikret. Vi vil introducere 802.1x Genkendelsens infrastruktur<br />
som en helhed og gå ind i detaljer omkring opsætning for hver fundamental komponent i 802.1x<br />
Genkendelsen.<br />
802.1x Genkendelse Infrastruktur<br />
The Infrastructure diagram showing above illustrates that a group of 802.11 wireless clients is trying to<br />
form a 802.11 wireless network with the Access Point in order to have access to the Internet/Intranet.<br />
In 802.1x authentication infrastructure, each of these wireless clients would have to be authenticated by<br />
the Radius server, which would grant the authorized client and notified the Access Point to open up a<br />
communication port to be used for the granted client. There are 2 Extensive Authentication Protocol<br />
(EAP) methods supported: (1) MD5 and (2) TLS.<br />
MD5 authentication is simply a validation of existing user account and password that is stored in the<br />
server with what are keyed in by the user. Therefore, wireless client user will be prompted for account/password<br />
validation every time when he/she is trying to get connected. TLS authentication is a<br />
more complicated authentication, which involves using certificate that is issued by the Radius server,<br />
for authentication. TLS authentication is a more secure authentication, since not only the Radius server<br />
authenticates the wireless client, but also the client can validate the Radius server by the certificate that<br />
it issues. The authentication request from wireless clients and reply by the Radius Server and Access<br />
Point process can be briefed as follows:<br />
1. The client sends an EAP start message to the Access Point<br />
2. The Access Point replies with an EAP Request ID message<br />
43