Authenticating Wireless Clients Flashcards

1
Q

What is the purpose of open authentication

A

to validate device is a valid 802.11 device by authenticating its hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Does open authentication require credentials

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 2 modes of authentication supported by WPA

A

WPA personal - pre shared key is used to authenticate clients/APs/WLC

WPA enterprise - EAP is used to authenticate clients/APs/WLC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In WPA personal mode which of the following devices need to be configured with the PSK
1. Client
2. AP
3. WLC

A

All

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is EAP

A

Extensible authentication Protocol defines a set of authentication methods that can be used to authenticate wireless devices.

In a wireless set up EAP will occur between the client and the authentication server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does 802.1x do

A

Limits a wireless clients access to a network until the user has successfully authenticated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In 802.1x / EAP what is the definition of the following roles:
Supplicant
Authentication Server
Authenticator

A

Supplicant - device requiring authentication.

Authentication Server - The server that processes the authentication (RADIUS or TACACS)
Authenticator - device between supplicant and authentication server typically a AP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Following the authentication what is EAPOL

A

EAP over LAN is used to exchange the encryption keys in a 4-way handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

After the EAPOL is complete and the PMK and GMK keys are exchanged what happens

A

The 802.1x is unblocked and the client can access the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is WEB AUTH

A

When the user is presented with content to read and interact with this could be a AUP, request credentials or display info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What can be configured in the WLC under the config > security page

A

Radius server
Web AUTH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly