Solved

RADIUS server or wpa authentication

Posted on 2006-07-07
2
652 Views
Last Modified: 2008-02-20
hi i would be greatful if someone could highlight the pros and cons of radius server v wpa authentication
does radius have any overheads like wpa?
thanks
0
Comment
Question by:exdos
2 Comments
 
LVL 9

Accepted Solution

by:
jasonr0025 earned 500 total points
ID: 17063278
Radius is descriptive of a database that authentacates wireless users by username/password.  
WEP and WPA are methods of providing wireless security using keys common between AP and client.  WPA is a step up from WEP in which it rotates keys with data frames instead of using the same key-making it a little tougher to gather entire key/
WPA encrypts this key with TKIP or AES: AES bieng the better but less supported and more likely to drop packets.  
In general using a radius server allows you to authenticate the user, not just the key.  If the wrong person gains your wpa key and tries to access the wireless network- they would still need to verify with radius to use the connection.  Without radius they just need the key to gain wireless access.  Using radius allows you to control several aspects of your wireless network-login times, restrictions.
Radius should add little to no  overhead to existing network usage and bandwidth as well as server overhead, but well worth the security to businesses.
WPA2 mixed (both tkip and aes) using radius is probobly the best way to go-with a few patches from microsoft for your wireless adapter and you should be good.
If you want to run radius and are running server 2003 you are good. If you need a open source check out www.freeradius.org(awsome)
0
 

Author Comment

by:exdos
ID: 17098954
well thanks for the infomation, it has made my understanding more clearer now
so using a raduis server just adds another level of security to the wireless setup.
I think i will stick to wpa for the time being.
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DNS @ Naked Domain Record 5 69
How to configure this IP Address to my firewall 15 85
Hybrid WAN vs SD WAN 4 35
What Can't I Connect by FTP??? 27 56
Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now