From the course: Cisco CCNA (200-301) Cert Prep: 1 Network Fundamentals and Access

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Wireless security

Wireless security

- [Instructor] There are several methods, new and old, to authenticate a user, as they attempt to join a wireless network. Authentication is simply supplying some form of credentials to be allowed access to join. A lot of guest networks have open authentication. Open auth accepts all connections, with zero authentication. All clients that want to connect, are allowed to do so. Many of these open auth networks employ hotspots, that require the user to login via webpage, to gain true access to the network. The Extensible Authentication Protocol, EAP, is a set of functions that authentication methods utilize to authenticate users. In essence, it's a framework that different authentication methods use auth users as they attempt connection. 802.1X is a system, that runs a piece of software called a supplicant on a client device, like a phone or laptop. When they connect to a network the supplicant will speak with an authenticator, which is a network device, and is kind of along the access…

Contents