Solved

RADIUS server or wpa authentication

Posted on 2006-07-07
2
657 Views
Last Modified: 2008-02-20
hi i would be greatful if someone could highlight the pros and cons of radius server v wpa authentication
does radius have any overheads like wpa?
thanks
0
Comment
Question by:exdos
2 Comments
 
LVL 9

Accepted Solution

by:
jasonr0025 earned 500 total points
ID: 17063278
Radius is descriptive of a database that authentacates wireless users by username/password.  
WEP and WPA are methods of providing wireless security using keys common between AP and client.  WPA is a step up from WEP in which it rotates keys with data frames instead of using the same key-making it a little tougher to gather entire key/
WPA encrypts this key with TKIP or AES: AES bieng the better but less supported and more likely to drop packets.  
In general using a radius server allows you to authenticate the user, not just the key.  If the wrong person gains your wpa key and tries to access the wireless network- they would still need to verify with radius to use the connection.  Without radius they just need the key to gain wireless access.  Using radius allows you to control several aspects of your wireless network-login times, restrictions.
Radius should add little to no  overhead to existing network usage and bandwidth as well as server overhead, but well worth the security to businesses.
WPA2 mixed (both tkip and aes) using radius is probobly the best way to go-with a few patches from microsoft for your wireless adapter and you should be good.
If you want to run radius and are running server 2003 you are good. If you need a open source check out www.freeradius.org(awsome)
0
 

Author Comment

by:exdos
ID: 17098954
well thanks for the infomation, it has made my understanding more clearer now
so using a raduis server just adds another level of security to the wireless setup.
I think i will stick to wpa for the time being.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Can't connect to WAMP server 5 71
IPv6 and IPv4 Subnetting scheme 4 39
How to calculate the netmask 5 78
Running a 2nd company from the same location 3 58
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

790 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question