Skip to main content

Questions tagged [authentication]

For questions about authentication in a network perspective. For instance, you are troubleshooting an issue with SSH authentication or you are having trouble getting an IPsec tunnel to authenticate properly. Any authentication issues or configurations that are related to network devices.

0 votes
0 answers
326 views

Perhaps the question should be "Is SHA authentication available for the Cisco implementation of BGP" but just in case the limitation is somehow at the protocol level, I kept it general. The ...
Mountain Scott's user avatar
0 votes
0 answers
67 views

I read this Wikipedia article and I can't understand, why GSM do challenge-response authencation before encryption? Why it doesn't start encryption at the beggining and authencate with it? Why this: ...
worner's user avatar
  • 21
0 votes
1 answer
133 views

I'm wondering if the following is possible given the limitations/constraints of RADIUS, CoA, and fundamental limits of 802.11 authentication, etc. I would like a wireless configuration with a single ...
user3814483's user avatar
1 vote
2 answers
3k views

cisco IOS stores public keys used for authentication as hashes. cisco obviously does not store the key itself because you can simply copy these key-hash lines between machines and you can authenticate ...
ericx's user avatar
  • 195
0 votes
2 answers
577 views

In the 802.11-2020 standard, you can read, regarding 802.11 Association To deliver an MSDU within an ESS via the DS, the DS needs to know which AP within the ESS to deliver the MSDU, so that the MSDU ...
user avatar
2 votes
1 answer
1k views

I am monitoring the traffic from a Fortinet Fortigate 100E firewall and I am seeing the user name of a former employee whose local and domain accounts were deleted. I can't ask Fortinet support ...
mfloris's user avatar
  • 195
1 vote
1 answer
500 views

We know that the AuC (Authentication Center) is used to identify GSM subscribers in the case of roaming or when the subscriber is requesting access to mobile network for the first time. But, I'm ...
zazar's user avatar
  • 63
1 vote
1 answer
350 views

I am having issue regarding wireless security Mechanisms. WEP, WPA and WPA2 TKIP,EAP, LEAP, PEAP, EAP-TLS, EAP-TTLS and CCMP How do we implement these security mechanism effectively on ...
infra's user avatar
  • 3,148
1 vote
2 answers
1k views

In an open network you have the authentication frame on just the 802.11 level: but if the network has WEP or WPA(2/3) there will also be a four way handshake: My question is, where does the 4 way ...
jf4i2d's user avatar
  • 13
0 votes
1 answer
718 views

Need to create a BGP authentication keychain between Cisco and Juniper devices. Need assistance with config commands for Cisco 9300-24S.
Tony Perkins's user avatar
0 votes
1 answer
74 views

I'm studying fog-cloud-iot systems and I bumped into OpenMTC. In order to understand better how their systems work, I would like to know how the authentication between edge devices and gateway and ...
Raydar's user avatar
  • 21
5 votes
2 answers
2k views

I have multiple Access Points on the same network with a Radius server for authentication. When I switch from one AP to another, do I have to go through the complete re-authentication processes each ...
Tushar Malpani's user avatar
0 votes
1 answer
463 views

I'm studying the 802.1.X authentication guidelines and the DIAMETER protcol as successor of RADIUS but i can't figure out what are the main difference between pure 802.1X Port-Based Authentication and ...
Raydar's user avatar
  • 21
1 vote
0 answers
60 views

While i was studying authentication methods in 5g i bumped into 3 authentication methods that seems to be the most important ones: 5G-AKA,EAP-AKA,EAP-TLS. Which one of these three could be more ...
Raydar's user avatar
  • 21
1 vote
0 answers
49 views

I'm writing a Thesis on IoT networks and authentication protocols, I've found this technology called Zigbee that seems to be really interesting but i can't find anything about which authentication ...
Raydar's user avatar
  • 21

15 30 50 per page
1
2 3 4 5 6