• General
    • Terms and Conditions
    • House rules
  • Consulting
  • Blog
  • About Me
    • Resume
Skip to content (Press Enter)

RaatsWireless

Where wireless is a passion

  • General
    • Terms and Conditions
    • House rules
  • Consulting
  • Blog
  • About Me
    • Resume

Blog

HomeBlog (Page 4)
CWSPStudyper-user PSK and SAE

per-user PSK and SAE

March 10, 2019September 28, 2017 No Comment on per-user PSK and SAE

In the previous blog about PSK authentication in general, I discussed how weak PSK is against dictionary attacks and social engineering. Sadly, not all the devices support EAP authentication in enterprise environments, and even if it is not recommended to use PSK in an enterprise environment that may be the only option. Some Voice over …

CONTINUE READING
CWSPStudyPSK Authentication

PSK Authentication

March 10, 2019September 26, 2017 No Comment on PSK Authentication

In the blog about EAP we discussed that EAP is a very secure (depending on the method you use) authentication mechanism. Using EAP as authentication is also called WPA/WPA2 – enterprise. As the name said, you should use this all the time in enterprise environments. Another option is pre-shared keys (PSK) which is called WPA/WPA2 …

CONTINUE READING
CWSPStudyLDAP and RADIUS

LDAP and RADIUS

March 10, 2019September 23, 2017 No Comment on LDAP and RADIUS

RADIUS Deployments Like the different controller’s deployments, there are also different ISE deployments. Single site deployment This is a deployment when there is only one site. On this site, all the communications are done by a single RADIUS cluster and the LDAP database. Since it is a single site, everything is centralized. The queries between …

CONTINUE READING
CWSPStudyOverview – LDAP and RADIUS

Overview – LDAP and RADIUS

March 10, 2019September 22, 2017 No Comment on Overview – LDAP and RADIUS

Before we dive into RADIUS, first I want to explain a little bit about LDAP. Lightweight Directory Access Protocol is a protocol that is used for directory services over an IP network. It is possible that the RADIUS server has a database with user accounts for authentication, but most of the time it uses an …

CONTINUE READING
CWSPStudyEAP Authentication

EAP Authentication

March 10, 2019September 21, 2017 No Comment on EAP Authentication

As mentioned in the authentication blog, the Authentication Server (AS) and the Supplicant need to talk to each other with the same EAP protocol. The AS has also a server certificate which is used for two purposes. First it is used to show the supplicant that this server is the right server to send your …

CONTINUE READING
CWSPStudyOverview – Authentication

Overview – Authentication

March 8, 2019September 21, 2017 No Comment on Overview – Authentication

It doesn’t matter how strong the authentication is, it always comes back to three categories. – Something you know – Something you have – Something you are An example of something you know is a password for a PSK WLAN. Something you have can be the laptop that is part of the active directory or …

CONTINUE READING

Posts navigation

Older posts
Newer posts
Follow @MarkRaatsWiFi Tweet to @MarkRaatsWiFi

Recent Posts

  • Preparation CWSP
  • Overview – WIDS and WIPS
  • WIDS and WIPS analysis and monitoring
  • Rogue detection and mitigation
  • Overview – Roaming

Archives

Categories

RaatsWireless | mark@raatswireless.com
KVK: 89053419 | BTW/VAT: NL004692136B90 | NL47 RABO 0338566554

Copyright (C) RaatsWireless |
The Conference | Developed by Rara Themes Powered by WordPress.