New Training: Configure and Verify Wireless Security Features
In this 5-video skill, CBT Nuggets trainer Jacob Moran covers the various forms of secure authentication to a wireless network. Learn how to configure pre-shared keys, extensible authentication protocol, and web authentication by using your wireless LAN controller. Watch this new Cisco training.
Watch the full course: Cisco CCNP Enterprise Core
This training includes:
5 videos
20 minutes of training
You’ll learn these topics in this skill:
Introduction to Wireless Authentication
Wireless Security Authentication Options
Configuring Wireless Preshared Key Security
Configuring Wireless Extensible Authentication Protocol (EAP) Security
Configuring Wireless Web Authentication
3 Common Wireless Auth Protocols: WEP, EAP, Open Authentication
There are many different types of wireless authentication protocols used today, some providing enhanced authentication and security, whereas others pose some security risks. This brief overview will discuss three common wire authentication protocols known as Open Authentication, WEP, and EAP.
Open Authentication, a common protocol from one of the first authentication method standards 802.11, is a very straightforward protocol, although it lacks some security features. Open Authentication allows for direct communication between endpoints and autonomous systems without qualification by the autonomous system.
WEP or Wired Equivalent Privacy is another wireless authentication protocol option that differs from the previously mentioned Open Authentication in its security enhancements. This protocol is a security algorithm that leverages RC4 Cipher to encrypt data that is passed between nodes. The intention of WEP is to provide a security-enhanced alternative to the popular Open Authentication protocol. Both of these wireless authentication protocols provide a glimpse into the fascinating world of wireless authentication.
delivered to your inbox.
By submitting this form you agree to receive marketing emails from CBT Nuggets and that you have read, understood and are able to consent to our privacy policy.