Solved

Using EAP for WPA2 Enterprise access

Posted on 2010-11-10
2
404 Views
Last Modified: 2013-12-09
Hi All

I'm trying to learn about EAP and how it works with WPA2 Enterprise in terms of securing the authentication mechanism.

I had some questions:

1. Would I be correct in saying, as mentioned in another of my questions, that with WPA2 Authentication, EAP is a form of securiing the authentication mechanism. This can be via certificates (e.g. EAP TLS) or pre-shared keys (EAP-PSK)/

2. With EAP-TLS, how are the certificates generated and how are they installed on the client?

0
Comment
Question by:Joe_Budden
2 Comments
 
LVL 7

Accepted Solution

by:
jesaja earned 250 total points
ID: 34106748
1. yes EAP is a authentication methode  EAP-TLS is certificate based and EAP-PSK pre-shared based


2. for example certificates can be deployed automatically to users within a AD using an Enterprise CA (Autoenrollmend) or  installed on the client manually, or certificates on smart cards
0
 
LVL 5

Assisted Solution

by:RikeR
RikeR earned 250 total points
ID: 34110302
1. EAP is only a framework for authentication, not a specific authentication mechanism. The security therefore is different in each implementation. The most secure is EAP-TLS which uses client certificates.

2. You need an PKI to distribute certificates. You can for example use TinyCA2 for generating the certificates. These can be exported in e.g. PKCS#12 format which are readable to most operating systems, including smartphones. Using Windows you can just double-click the PKCS#12 file and automatically it will get installed.
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now