Teletronics EZ Bridge 802.11G Manuel d'utilisateur Page 26

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 61
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 25
3. The authentication-initiating wireless node replies to the authenticating
wireless node with the challenge text that is encrypted using WEP and
an encryption key that is derived from the shared key authentication
secret.
4. The authentication result is positive if the authenticating wireless node
determines that the decrypted challenge text matches the challenge
text originally sent in the second frame. The authenticating wireless
node sends the authentication result.
Because the shared key authentication secret must be manually distributed
and typed, this method of authentication does not scale appropriately in
large infrastructure network mode, such as corporate campuses.
Vue de la page 25
1 2 ... 21 22 23 24 25 26 27 28 29 30 31 ... 60 61

Commentaires sur ces manuels

Pas de commentaire