Shared Key Authentication

CWNA Summary Notes: Legacy 802.11 Security | Legacy Authentication

Posted on Updated on


Legacy Authentication

Legacy authentication methods were more of an authentication of capability (verification between two devices that they were valid 802.11 devices) and not so much an authentication of user identity.

They are of two types: Read the rest of this entry »

Advertisements