Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Using EAP for WPA2 Enterprise access

Posted on 2010-11-10
2
Medium Priority
?
411 Views
Last Modified: 2013-12-09
Hi All

I'm trying to learn about EAP and how it works with WPA2 Enterprise in terms of securing the authentication mechanism.

I had some questions:

1. Would I be correct in saying, as mentioned in another of my questions, that with WPA2 Authentication, EAP is a form of securiing the authentication mechanism. This can be via certificates (e.g. EAP TLS) or pre-shared keys (EAP-PSK)/

2. With EAP-TLS, how are the certificates generated and how are they installed on the client?

0
Comment
Question by:Joe_Budden
2 Comments
 
LVL 7

Accepted Solution

by:
jesaja earned 1000 total points
ID: 34106748
1. yes EAP is a authentication methode  EAP-TLS is certificate based and EAP-PSK pre-shared based


2. for example certificates can be deployed automatically to users within a AD using an Enterprise CA (Autoenrollmend) or  installed on the client manually, or certificates on smart cards
0
 
LVL 5

Assisted Solution

by:RikeR
RikeR earned 1000 total points
ID: 34110302
1. EAP is only a framework for authentication, not a specific authentication mechanism. The security therefore is different in each implementation. The most secure is EAP-TLS which uses client certificates.

2. You need an PKI to distribute certificates. You can for example use TinyCA2 for generating the certificates. These can be exported in e.g. PKCS#12 format which are readable to most operating systems, including smartphones. Using Windows you can just double-click the PKCS#12 file and automatically it will get installed.
0

Featured Post

Free Backup Tool for VMware and Hyper-V

Restore full virtual machine or individual guest files from 19 common file systems directly from the backup file. Schedule VM backups with PowerShell scripts. Set desired time, lean back and let the script to notify you via email upon completion.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This program is used to assist in finding and resolving common problems with wireless connections.
Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question