Questions tagged [authentication]
For questions about authentication in a network perspective. For instance, you are troubleshooting an issue with SSH authentication or you are having trouble getting an IPsec tunnel to authenticate properly. Any authentication issues or configurations that are related to network devices.
83 questions
0
votes
0
answers
326
views
Is SHA authentication available for BGP?
Perhaps the question should be "Is SHA authentication available for the Cisco implementation of BGP" but just in case the limitation is somehow at the protocol level, I kept it general. The ...
0
votes
0
answers
67
views
Why GSM do challenge-response authencation before encryption?
I read this Wikipedia article and I can't understand, why GSM do challenge-response authencation before encryption? Why it doesn't start encryption at the beggining and authencate with it?
Why this:
...
0
votes
1
answer
133
views
Single SSID w/PSK to default VLAN, Secondary Auth EAP-TLS to a second VLAN
I'm wondering if the following is possible given the limitations/constraints of RADIUS, CoA, and fundamental limits of 802.11 authentication, etc.
I would like a wireless configuration with a single ...
1
vote
2
answers
3k
views
How to generate cisco key-hash string
cisco IOS stores public keys used for authentication as hashes.
cisco obviously does not store the key itself because you can simply copy these key-hash lines between machines and you can authenticate ...
0
votes
2
answers
577
views
What is the point of Wi-Fi association?
In the 802.11-2020 standard, you can read, regarding 802.11 Association
To deliver an MSDU within an ESS via the DS, the DS needs to know which AP within the ESS to deliver the MSDU, so that the MSDU ...
2
votes
1
answer
1k
views
Fortigate 100E user names in syslog
I am monitoring the traffic from a Fortinet Fortigate 100E firewall and I am seeing the user name of a former employee whose local and domain accounts were deleted. I can't ask Fortinet support ...
1
vote
1
answer
500
views
Authentication center in GSM
We know that the AuC (Authentication Center) is used to identify GSM subscribers in the case of roaming or when the subscriber is requesting access to mobile network for the first time. But, I'm ...
1
vote
1
answer
350
views
How select and implement proper wireless security mechanism?
I am having issue regarding wireless security Mechanisms.
WEP, WPA and WPA2
TKIP,EAP, LEAP, PEAP, EAP-TLS, EAP-TTLS and CCMP
How do we implement these security mechanism effectively on ...
1
vote
2
answers
1k
views
Where does the 4way handshake fit in with the 802.11 Authentication Frame
In an open network you have the authentication frame on just the 802.11 level:
but if the network has WEP or WPA(2/3) there will also be a four way handshake:
My question is, where does the 4 way ...
0
votes
1
answer
718
views
BGP Authentication Key-Chain Between Cisco IOS XE L3 Switch (c9300-24S) and Juniper MX480 Router
Need to create a BGP authentication keychain between Cisco and Juniper devices. Need assistance with config commands for Cisco 9300-24S.
0
votes
1
answer
74
views
Authentication of devices and gateway in OpenMTC [closed]
I'm studying fog-cloud-iot systems and I bumped into OpenMTC.
In order to understand better how their systems work, I would like to know how the authentication between edge devices and gateway and ...
5
votes
2
answers
2k
views
Do I need to re-authenticate every time I switch a access point?
I have multiple Access Points on the same network with a Radius server for authentication. When I switch from one AP to another, do I have to go through the complete re-authentication processes each ...
0
votes
1
answer
463
views
What's the difference between DIAMETER and 802.1X Authentication?
I'm studying the 802.1.X authentication guidelines and the DIAMETER protcol as successor of RADIUS but i can't figure out what are the main difference between pure 802.1X Port-Based Authentication and ...
1
vote
0
answers
60
views
5g authentication method for IoT [closed]
While i was studying authentication methods in 5g i bumped into 3 authentication methods that seems to be the most important ones: 5G-AKA,EAP-AKA,EAP-TLS.
Which one of these three could be more ...
1
vote
0
answers
49
views
Zigbee authentication protocol [closed]
I'm writing a Thesis on IoT networks and authentication protocols, I've found this technology called Zigbee that seems to be really interesting but i can't find anything about which authentication ...