Solved

Using EAP for WPA2 Enterprise access

Posted on 2010-11-10
2
406 Views
Last Modified: 2013-12-09
Hi All

I'm trying to learn about EAP and how it works with WPA2 Enterprise in terms of securing the authentication mechanism.

I had some questions:

1. Would I be correct in saying, as mentioned in another of my questions, that with WPA2 Authentication, EAP is a form of securiing the authentication mechanism. This can be via certificates (e.g. EAP TLS) or pre-shared keys (EAP-PSK)/

2. With EAP-TLS, how are the certificates generated and how are they installed on the client?

0
Comment
Question by:Joe_Budden
2 Comments
 
LVL 7

Accepted Solution

by:
jesaja earned 250 total points
ID: 34106748
1. yes EAP is a authentication methode  EAP-TLS is certificate based and EAP-PSK pre-shared based


2. for example certificates can be deployed automatically to users within a AD using an Enterprise CA (Autoenrollmend) or  installed on the client manually, or certificates on smart cards
0
 
LVL 5

Assisted Solution

by:RikeR
RikeR earned 250 total points
ID: 34110302
1. EAP is only a framework for authentication, not a specific authentication mechanism. The security therefore is different in each implementation. The most secure is EAP-TLS which uses client certificates.

2. You need an PKI to distribute certificates. You can for example use TinyCA2 for generating the certificates. These can be exported in e.g. PKCS#12 format which are readable to most operating systems, including smartphones. Using Windows you can just double-click the PKCS#12 file and automatically it will get installed.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question