Skip to content

Configuring Authentication Types on IEEE 802.11

Dong-Hwan,Jung edited this page Mar 9, 2016 · 1 revision

Configuring Authentication Types (์ธ์ฆ ๊ตฌ์„ฑ ํƒ€์ž…)


๋ฒˆ์—ญ ํŽ˜์ด์ง€ : http://www.cisco.com/c/en/us/td/docs/wireless/access_point/12-3_7_JA/configuration/guide/i1237sc/s37auth.html

์ฐธ๊ณ  : ๋ฒˆ์—ญ์ค‘์ž…๋‹ˆ๋‹ค.

Understanding Authenication Types [์ธ์ฆ ํƒ€์ž…์— ๋Œ€ํ•œ ์ดํ•ด]

Eng

This section describes the authentication types that you can configure on the access point. 
The authentication types are tied to the SSIDs that you configure for the access point.
If you want to serve different types of client devices with the same access point,you can configure multiple SSIDs. 
See Chapter 7 "Configuring Multiple SSIDs," for complete instructions on configuring multiple SSIDs.
Before a wireless client device can communicate on your network through the access point, 
it must authenticate to the access point using open or shared-key authentication. 
For maximum security, client devices should also authenticate to your network 
using MAC-address or EAP authentication, authentication types that rely on an authentication server on your network.

Kor

์ด ์žฅ์€ ๋‹น์‹ ์ด AP์—์„œ ์„ค์ •ํ•  ์ˆ˜ ์žˆ๋Š” ์ธ์ฆ ํƒ€์ž…์— ๋Œ€ํ•ด ์„ค๋ช…ํ•ฉ๋‹ˆ๋‹ค.
์ธ์ฆ ํƒ€์ž…์€ ๋‹น์‹ ์ด ์„ค์ •ํ•˜๊ณ ์ž ํ•˜๋Š” AP์˜ SSID์— ๋ฌถ์—ฌ ์žˆ์Šต๋‹ˆ๋‹ค. 
๋งŒ์•ฝ ๊ฐ™์€ AP๋กœ ํด๋ผ์ด์–ธํŠธ ์žฅ์น˜์˜ ๊ฐ๊ฐ ๋‹ค๋ฅธ ํƒ€์ž…๋“ค์„ ์ œ๊ณตํ•˜๊ณ  ์‹ถ๋‹ค๋ฉด ๋‹ค์ค‘ SSID๋ฅผ ์„ค์ •ํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. 
์•Œ๊ณ  ์‹ถ๋‹ค๋ฉด Chapter 7์„ ๋ณด์„ธ์š”.
๋ฌด์„  ํด๋ผ์ด์–ธํŠธ ์žฅ์น˜๋Š” AP๋ฅผ ํ†ตํ•˜์—ฌ ๋„คํŠธ์›Œํฌ์™€ ํ†ต์‹ ํ•˜๊ธฐ ์ „์— ๋ฐ˜๋“œ์‹œ  
AP๋Š” open ์ด๋‚˜ shared-key๋ฅผ ์ด์šฉํ•˜์—ฌ ์ธ์ฆ ์ ˆ์ฐจ๋ฅผ ๋ฐŸ์•„์•ผ ํ•˜๋ฉฐ,  
์ตœ์„ ์˜ ๋ณด์•ˆ์„ ์œ„ํ•˜์—ฌ, ํด๋ผ์ด์–ธํŠธ ์žฅ์น˜๋„ ์—ญ์‹œ ๋ฐ˜๋“œ์‹œ MAC address๋‚˜ EAP ์ธ์ฆ์ด๋‚˜ 
๋˜๋Š” ์ธ์ฆ ์„œ๋ฒ„์— ์˜์กดํ•˜๊ณ  ์žˆ๋Š” ์ธ์ฆ ํƒ€์ž…๋“ค์„ ์ด์šฉํ•˜์—ฌ ๋‹น์‹ ์˜ ๋„คํŠธ์›Œํฌ๋ฅผ ์ธ์ฆ ๋ฐ›์•„์•ผ ํ•ฉ๋‹ˆ๋‹ค.

Note Eng

By default, the access point sends reauthentication requests 
to the authentication server with the service-type attribute set to authenticate-only. 
However, some Microsoft IAS servers do not support the authenticate-only service-type attribute. 
Changing the service-type attribute to login-only ensures that Microsoft IAS servers recognize 
reauthentication requests from the access point. 
Use the dot11 aaa authentication attributes service-type login-only global configuration 
command to set the service-type attribute in reauthentication requests to login-only.

Kor

๊ธฐ๋ณธ์ ์œผ๋กœ, ์ธ์ฆ์„œ๋ฒ„(authentication server)๊ฐ€ ์„œ๋น„์Šค ํƒ€์ž… ์†์„ฑ(service-type attribute)์„ 
authenticate-only(์ธ์ฆ ์ „์šฉ)๋กœ ์„ค์ •ํ•˜๊ธฐ ์œ„ํ•ด AP(Access Point)๋Š” ์žฌ์ธ์ฆ ์š”์ฒญ์„ ๋ณด๋ƒ…๋‹ˆ๋‹ค. 
๊ทธ๋Ÿฌ๋‚˜ ๋ช‡๋ช‡ ์ผ๋ถ€์˜ Microsoft IAS Server๋Š” authenticate-only์ด๋ผ๋Š” ์„œ๋น„์Šค ํƒ€์ž… ์†์„ฑ์„ ์ง€์›ํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค. 
์„œ๋น„์Šค ํƒ€์ž… ์†์„ฑ์„ login-only(๋กœ๊ทธ์ธ ์ „์šฉ)๋กœ ๋ฐ”๊พธ์–ด Microsoft IAS Server๋“ค์ด AP๋กœ ๋ถ€ํ„ฐ ์˜จ ์žฌ์š”์ฒญ์„ ํ†ตํ•˜์—ฌ ์ธ์ฆ ๋˜๋„๋ก ๋ณด์žฅํ•ฉ๋‹ˆ๋‹ค. 
dot11 aaa authentication attributes service-type login-only (dot11 aaa ๋กœ๊ทธ์ธ ์ „์šฉ ์„œ๋น„์Šค ํƒ€์ž… ์†์„ฑ๋“ค) ์„ ์‚ฌ์šฉํ•˜์„ธ์š”. 
๊ทธ๊ฒƒ์ด ์žฌ์š”์ฒญ ์‹œ ์„œ๋น„์Šค ํƒ€์ž… ์†์„ฑ์„ login-only์„ ์š”์ฒญํ•˜๋„๋ก ๋งŒ๋“ญ๋‹ˆ๋‹ค.

Eng

The access point uses several authentication mechanisms or types and can use more than one at the same time. 
These sections explain each authentication type:
โ€ขOpen Authentication to the Access Point
โ€ขShared Key Authentication to the Access Point
โ€ขEAP Authentication to the Network
โ€ขMAC Address Authentication to the Network
โ€ขCombining MAC-Based, EAP, and Open Authentication

Kor

AP๋Š” ์—ฌ๋Ÿฌ ์ธ์ฆ ๋ฉ”์นด๋‹ˆ์ฆ˜ ๋˜๋Š” ํƒ€์ž…์„ ๊ฐ€์ง€๊ณ  ์žˆ๊ณ  ๋™์‹œ์— ์—ฌ๋Ÿฌ๊ฐœ๋ฅผ ์‚ฌ์šฉํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. 
๋ฉ”์นด๋‹ˆ์ฆ˜์€ ๋‹ค์Œ๊ณผ ๊ฐ™์€ ๋ฐฉ์‹์ด ์žˆ๋Š”๋ฐ ์ƒ๋‹จ์˜ ์‚ฌ์ดํŠธ์— ๋“ค์–ด๊ฐ€์…”์„œ ๋งํฌ๋กœ ์ง์ ‘ ๋“ค์–ด๊ฐ€์…”์„œ ๋ณด์‹œ๊ธธ ๋ฐ”๋ž˜์š”.
โ€ขOpen Authentication to the Access Point
โ€ขShared Key Authentication to the Access Point
โ€ขEAP Authentication to the Network
โ€ขMAC Address Authentication to the Network
โ€ขCombining MAC-Based, EAP, and Open Authentication

Open Authentication to the Access Point[AP๋กœ ๋ถ€ํ„ฐ Open ์ธ์ฆ] Eng

Open authentication allows any device to authenticate and then attempt to communicate with the access point. 
Using open authentication, any wireless device can authenticate with the access point, 
but the device can communicate only if its WEP keys match the access point's. 
Devices not using WEP do not attempt to authenticate with an access point that is using WEP. 
Open authentication does not rely on a RADIUS server on your network.

Figure 11-1 shows the authentication sequence between a device trying to authenticate and 
an access point using open authentication. 
In this example, the device's WEP key does not match the access point's key, 
so it can authenticate but not pass data.

Kor

AP๋กœ ๋ถ€ํ„ฐ Open ์ธ์ฆ
Open ์ธ์ฆ์€ ์–ด๋–ค ๊ธฐ๊ณ„๋“  ์ธ์ฆ์„ ํ—ˆ์šฉํ•˜๋ฉฐ, ๋™์‹œ์— AP์™€ ํ†ต์‹ ์„ ์‹œ๋„ํ•ฉ๋‹ˆ๋‹ค. 
Open ์ธ์ฆ์„ ์‚ฌ์šฉํ•˜๋ฉด ์–ด๋–ค ๋ฌด์„  ๊ธฐ๊ณ„๋“  AP์— ์ธ์ฆ ๋ฐ›์„ ์ˆ˜ ์žˆ์ง€๋งŒ, 
๋ฌด์„ ๊ธฐ๊ณ„์˜ WEPํ‚ค์™€ AP์˜ ํ‚ค๊ฐ€ ๋งž์•„์•ผ๋งŒ ํ†ต์‹ ์ด ๊ฐ€๋Šฅํ•ฉ๋‹ˆ๋‹ค. 
WEP์„ ์‚ฌ์šฉํ•˜์ง€ ์•Š๋Š” ์žฅ์น˜๋“ค์€ WEP์„ ์‚ฌ์šฉํ•˜๊ณ  ์žˆ๋Š” AP์™€ ์ธ์ฆํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค. 
Open ์ธ์ฆ ์€ RADIUS ์„œ๋ฒ„์— ์˜์กดํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.

๊ทธ๋ฆผ 11-1 ๋Š” ์žฅ์น˜์™€ AP๊ฐ„์˜ ์ธ์ฆ ์‹œ๋„๋ฅผ Open ์ธ์ฆ์„ ์ด์šฉํ•˜์—ฌ ์ˆœ์ฐจ์ ์œผ๋กœ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. 
์ด ์˜ˆ๋Š”, ์žฅ์น˜์˜ WEP key๊ฐ€ AP์˜ WEPํ‚ค์™€ ๋งž์ง€ ์•Š์€ ๊ฒƒ์„ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. 
๋”ฐ๋ผ์„œ ์ธ์ฆ ๋ฐ›์ง€ ๋ชปํ•˜๋Š” ๊ฒƒ์„ ๋ณผ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

54583

Figure 11-1 Sequence for Open Authentication(๊ทธ๋ฆผ 11-1)

Shared Key Authentication to the Access Point[AP๋กœ ๋ถ€ํ„ฐ ๊ณต์œ ํ‚ค ์ธ์ฆ] Eng

Cisco provides shared key authentication to comply with the IEEE 802.11b standard. 
However, because of shared key's security flaws, Cisco recommends that you avoid using it.
During shared key authentication, the access point sends an unencrypted challenge text string 
to any device attempting to communicate with the access point. 
The device requesting authentication encrypts the challenge text and sends it back to the access point. 
If the challenge text is encrypted correctly, the access point allows the requesting device to authenticate. 
Both the unencrypted challenge and the encrypted challenge can be monitored, 
however, which leaves the access point open to attack from an intruder who calculates the WEP key 
by comparing the unencrypted and encrypted text strings. 
Because of this weakness, shared key authentication can be less secure than open authentication. 
Like open authentication, shared key authentication does not rely on a RADIUS server on your network.
Figure 11-2 shows the authentication sequence between a device trying to authenticate and 
an access point using shared key authentication. 
In this example the device's WEP key matches the access point's key, so it can authenticate and communicate.

Kor

์‹œ์Šค์ฝ”๋Š” IEEE 802.11b ํ‘œ์ค€์„ ์ค€์ˆ˜ํ•˜์—ฌ ๊ณต์œ ํ‚ค ์ธ์ฆ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. 
๊ทธ๋Ÿฌ๋‚˜ ๊ณต์œ ํ‚ค์˜ ๋ณด์•ˆ์  ๊ฒฐ์  ๋•Œ๋ฌธ์— ์‹œ์Šค์ฝ”๋Š” ์ด ๋ฐฉ๋ฒ•์„ ํ”ผํ•˜๋Š” ๊ฒƒ์„ ์ถ”์ฒœํ•ฉ๋‹ˆ๋‹ค.
๊ณต์œ ํ‚ค ์ธ์ฆ์„ ์‚ฌ์šฉํ•˜๋Š” ๋™์•ˆ, AP๋Š” ์•”ํ˜ธํ™” ๋˜์ง€ ์•Š์€ ๋ฌธ์ž์—ด์„ ์ž์‹ ๊ณผ ์—ฐ๊ฒฐํ•˜๊ณ ์ž ํ•˜๋Š” ๋ชจ๋“  ์žฅ์น˜์—๊ฒŒ ๋ณด๋ƒ…๋‹ˆ๋‹ค. 
์ธ์ฆ์„ ์š”์ฒญํ•œ ์žฅ์น˜๋Š” ์ „์†ก๋ฐ›์€ ๋ฌธ์ž์—ด์„ ์•”ํ˜ธํ™” ํ•˜๊ณ  ๋‹ค์‹œ AP์—๊ฒŒ ๋ณด๋ƒ…๋‹ˆ๋‹ค. 
๋งŒ์•ฝ ๋ฌธ์ž์—ด์ด ์˜ฌ๋ฐ”๋ฅด๊ฒŒ ์•”ํ˜ธํ™” ๋˜์–ด ๋ณด๋‚ด์กŒ๋‹ค๋ฉด AP๋Š” ์ธ์ฆ์„ ์š”์ฒญํ•œ ์žฅ์น˜๋ฅผ ์Šน์ธํ•ฉ๋‹ˆ๋‹ค. 
๊ทธ๋Ÿฌ๋‚˜ AP๋กœ ๋ณด๋‚ด์ง„ ์•”ํ˜ธํ™” ๋˜์ง€ ์•Š์€ ๋ฌธ์žฅ, ๊ฐ์‹œ๊ฐ€ ๊ฐ€๋Šฅํ•œ ์•”ํ˜ธํ™” ๋ฌธ์žฅ์€ ๋ฌธ์žฅ์„ ์ผ์ผ์ด ๊ฒ€์‚ฌํ•˜์—ฌ 
๋Œ€์กฐํ•˜์—ฌ WEP key๋ฅผ ๊ณ„์‚ฐํ•˜๋Š” ์นจ์ž…์ž๋“ค์—๊ฒŒ ๊ณต๊ฒฉ๋  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. 
์ด๋Ÿฌํ•œ ์ทจ์•ฝ์ ์œผ๋กœ ์ธํ•ด, ๊ณต์œ ํ‚ค ์ธ์ฆ์€ ๊ณต๊ฐœ ์ธ์ฆ๋ณด๋‹ค ๋‚ฎ์€ ๋ณด์•ˆ์„ ๊ฐ€์งˆ ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. 
Open์ธ์ฆ๊ณผ ๋งˆ์ฐฌ๊ฐ€์ง€๋กœ, ๊ณต์œ ํ‚ค ์ธ์ฆ์€ RADIUS์„œ๋ฒ„์— ์˜์กดํ•˜์ง€ ์•Š์Šต๋‹ˆ๋‹ค.

Figure 11-2๋Š” ์žฅ์น˜์™€ AP๊ฐ„์˜ ์ธ์ฆ ์‹œ๋„๋ฅผ ๊ณต์œ ํ‚ค ์ธ์ฆ์„ ์ด์šฉํ•˜์—ฌ ์ˆœ์ฐจ์ ์œผ๋กœ ๋ณด์—ฌ์ฃผ๊ณ  ์žˆ์Šต๋‹ˆ๋‹ค. 
์ด ์˜ˆ๋Š” ์žฅ์น˜์˜ WEPํ‚ค์™€ AP์˜ WEPํ‚ค์™€ ๋งค์น˜ํ•˜์—ฌ ์ธ์ฆ๊ณผ ํ†ต์‹ ์„ ํ•  ์ˆ˜ ์žˆ๋Š” ๋ชจ์Šต์ž…๋‹ˆ๋‹ค.

231083

Figure 11-2 Sequence for Shared Key Authentication(๊ทธ๋ฆผ 11-2)

EAP Authentication to the Network [๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•œ EAP์ธ์ฆ]

Eng

This authentication type provides the highest level of security for your wireless network. 
By using the Extensible Authentication Protocol (EAP) to interact with an EAP-compatible RADIUS server, 
the access point helps a wireless client device and the RADIUS server to perform mutual authentication and 
derive a dynamic unicast WEP key. 
The RADIUS server sends the WEP key to the access point, 
which uses it for all unicast data signals that it sends to or receives from the client. 
The access point also encrypts its broadcast WEP key (entered in the access point's WEP key slot 1) 
with the client's unicast key and sends it to the client.
When you enable EAP on your access points and client devices, 
authentication to the network occurs in the sequence shown in Figure 11-3:

Kor

์ด ์ธ์ฆ ๋ฐฉ๋ฒ•์€ ๋‹น์‹ ์˜ ๋ฌด์„  ๋„คํŠธ์›Œํฌ ์ƒ์—์„œ ๊ฐ€์žฅ ๋†’์€ ์ˆ˜์ค€์˜ ๋ณด์•ˆ์„ ์ œ๊ณตํ•ฉ๋‹ˆ๋‹ค. 
EAP์™€ ํ˜ธํ™˜๋˜๋Š” RADIUS์„œ๋ฒ„๋ฅผ ์ด์šฉํ•˜๋Š” ํ™•์žฅ๊ฐ€๋Šฅํ•œ ์ธ์ฆ ํ”„๋กœํ† ์ฝœ(EAP)๋ฅผ ์ด์šฉํ•จ์œผ๋กœ์„œ, 
AP๋Š” ๋ฌด์„  ํด๋ผ์ด์–ธํŠธ ์žฅ์น˜์™€ ์ƒํ˜ธ๊ฐ„ ์ธ์ฆ์„ ์ˆ˜ํ–‰ํ•˜๊ณ  dynamic unicast WEP key๋ฅผ ์–ป์–ด๋‚ด๋Š” 
RADIUS server๋ฅผ ๋„์™€์ค๋‹ˆ๋‹ค. RADIUS server๋Š” WEPํ‚ค๋ฅผ ํด๋ผ์ด์–ธํŠธ์™€ unicast data ์‹ ํ˜ธ๋ฅผ ์ฃผ๊ณ  ๋ฐ›๋Š” AP๋กœ ๋ณด๋‚ด์ง‘๋‹ˆ๋‹ค. 
AP๋Š” broadcast๋กœ ๋ณด๋‚ด์งˆ WEP key(AP์˜ WEP key slot 1์— ๋“ค์–ด๊ฐ€๋Š”)๋ฅผ ํด๋ผ์ด์–ธํŠธ์˜ 
unicast key์™€ ํ•จ๊ป˜ ์•”ํ˜ธํ™” ํ•˜์—ฌ ํด๋ผ์ด์–ธํŠธ์—๊ฒŒ ๋ณด๋ƒ…๋‹ˆ๋‹ค.
AP์™€ ํด๋ผ์ด์–ธํŠธ ์žฅ์น˜ ์œ„์— EAP๋ฅผ ์‚ฌ์šฉ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•  ๋•Œ, 
๋„คํŠธ์›Œํฌ๋กœ ๋ถ€ํ„ฐ์˜ ์ธ์ฆ์€ ๋‹ค์Œ Figure 11-3๊ทธ๋ฆผ์˜ ์ˆœ์ฐจ์ ์œผ๋กœ ์ด๋ฃจ์–ด์ง‘๋‹ˆ๋‹ค.

65583

Figure 11-3 Sequence for EAP Authentication (๊ทธ๋ฆผ 11-3)

Eng

In Steps 1 through 9 in Figure 11-3, 
a wireless client device and a RADIUS server on the wired LAN use 802.1x and EAP to perform a mutual authentication 
through the access point. The RADIUS server sends an authentication challenge to the client. 
The client uses a one-way encryption of the user-supplied password to generate a response to the challenge and 
sends that response to the RADIUS server. 
Using information from its user database, the RADIUS server creates its own response and 
compares that to the response from the client. When the RADIUS server authenticates the client, 
the process repeats in reverse, and the client authenticates the RADIUS server.
When mutual authentication is complete, the RADIUS server and the client determine a WEP key 
that is unique to the client and provides the client with the appropriate level of network access, 
thereby approximating the level of security in a wired switched segment to an individual desktop. 
The client loads this key and prepares to use it for the logon session.
During the logon session, the RADIUS server encrypts and sends the WEP key, 
called a session key, over the wired LAN to the access point. 
The access point encrypts its broadcast key with the session key and 
sends the encrypted broadcast key to the client, which uses the session key to decrypt it. 
The client and access point activate WEP and use the session and 
broadcast WEP keys for all communications during the remainder of the session.
There is more than one type of EAP authentication, but the access point behaves the same way for each type: 
it relays authentication messages from the wireless client device to the RADIUS server and 
from the RADIUS server to the wireless client device. 
See the "Assigning Authentication Types to an SSID" section for instructions on setting up EAP on the access point.

Kor

๊ทธ๋ฆผ 11-3์—์„œ 1~9 ๋‹จ๊ณ„์—์„œ, ๋ฌด์„  ํด๋ผ์ด์–ธํŠธ ์žฅ์น˜์™€ ์œ ์„  RADIUS ์„œ๋ฒ„๋Š” 802.1x์™€ EAP๋ฅผ AP๋ฅผ ํ†ตํ•˜์—ฌ ์ธ์ฆ์„ ๊ต๋ฅ˜ํ•˜๊ธฐ ์œ„ํ•ด ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค. 
RADIUS ์„œ๋ฒ„๋Š” ํด๋ผ์ด์–ธํŠธ๋กœ ์ธ์ฆ ์‹œ๋„๋ฅผ ํ•ฉ๋‹ˆ๋‹ค. ํด๋ผ์ด์–ธํŠธ๋Š” ์ธ์ฆ ์‹œ๋„์˜ ์‘๋‹ต์œผ๋กœ ๋งŒ๋“ค์–ด์ง„ ์‚ฌ์šฉ์ž-์ œ๊ณต ๋น„๋ฐ€๋ฒˆํ˜ธ๋ฅผ 
๋‹จ๋ฐฉํ–ฅ ์•”ํ˜ธ๋กœ ๋งŒ๋“ค์–ด ์‚ฌ์šฉํ•˜๊ณ , ๊ทธ ์‘๋‹ต์„ RADIUS ์„œ๋ฒ„๋กœ ๋ณด๋ƒ…๋‹ˆ๋‹ค. 
์‚ฌ์šฉ์ž์˜ ๋ฐ์ดํ„ฐ๋ฒ ์ด์Šค๋กœ ๋ถ€ํ„ฐ ์ •๋ณด๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ, RADIUS ์„œ๋ฒ„๋Š” ์ž์‹ ์˜ ์‘๋‹ต์„ ๋งŒ๋“ค๊ณ  ํด๋ผ์ด์–ธํŠธ๋กœ ์˜จ ์‘๋‹ต์„ ๋น„๊ตํ•ฉ๋‹ˆ๋‹ค. 
RADIUS์„œ๋ฒ„๊ฐ€ ํด๋ผ์ด์–ธํŠธ๋ฅผ ์ธ์ฆํ•  ๋•Œ, ์œ„์˜ ๊ณผ์ •์„ ์—ญ์œผ๋กœ ์ˆ˜ํ–‰ํ•˜์—ฌ, ํด๋ผ์ด์–ธํŠธ๋Š” RADIUS์„œ๋ฒ„๋ฅผ ์ธ์ฆํ•ฉ๋‹ˆ๋‹ค.
์„œ๋กœ์˜ ์ธ์ฆ์ด ๋๋‚ ๋•Œ, RADIUS์„œ๋ฒ„์™€ ํด๋ผ์ด์–ธํŠธ๋Š” ํด๋ผ์ด์–ธํŠธ์—๊ฒŒ ์œ ์ผํ•˜๊ณ  ํด๋ผ์ด์–ธํŠธ์—๊ฒŒ 
์ ํ•ฉํ•œ ๋„คํŠธ์›Œํฌ ์ ‘๊ทผ ๋‹จ๊ณ„์„ ์ œ๊ณตํ•˜๋Š” WEP key ๋ฅผ ๊ฒฐ์ •ํ•ฉ๋‹ˆ๋‹ค. 
๊ทธ ๋•Œ๋ฌธ์— ๊ฐœ๋ณ„์˜ ๋ฐ์Šคํฌํƒ‘์—์„œ wired switched segment์—์„œ์˜ ๋ณด์•ˆ ์ธ์ฆ ๋‹จ๊ณ„์— ๊ฐ€๊น์Šต๋‹ˆ๋‹ค. 
ํด๋ผ์ด์–ธํŠธ๋Š” ์ด ํ‚ค๋ฅผ ๊ฐ€์ ธ์˜ค๊ณ  ๋กœ๊ทธ์˜จ ์„ธ์…˜์„ ์‚ฌ์šฉํ•  ์ค€๋น„๋ฅผ ํ•ฉ๋‹ˆ๋‹ค.
๋กœ๊ทธ์˜จ ์„ธ์…˜ ๋‹จ๊ณ„์—์„œ, RADIUS ์„œ๋ฒ„๋Š” WEP key๋ฅผ ์•”ํ˜ธํ™” ํ•˜์—ฌ ๋ณด๋ƒ…๋‹ˆ๋‹ค. ์ด๊ฒƒ์„ ์„ธ์…˜ ํ‚ค๋ผ๊ณ  ๋ถˆ๋ฆฝ๋‹ˆ๋‹ค. 
์ด๊ฒƒ์€ wired LAN์„ ํƒ€๊ณ  AP๋กœ ๊ฐ‘๋‹ˆ๋‹ค. AP๋Š” AP์˜ broaddcast key์™€ ์„ธ์…˜ ํ‚ค๋ฅผ ์•”ํ˜ธํ™” ํ•˜๊ณ  
์•”ํ˜ธํ™”๋œ broadcast key๋ฅผ  ์„ธ์…˜ ํ‚ค๋ฅผ ์ด์šฉํ•˜์—ฌ broadcast key๋ฅผ ํ•ด๋…ํ•  ํด๋ผ์ด์–ธํŠธ์—๊ฒŒ ๋ณด๋ƒ…๋‹ˆ๋‹ค. 
ํด๋ผ์ด์–ธํŠธ์™€ AP๋Š” WEP๋ฅผ ํ™œ์„ฑํ™” ํ•˜๊ณ  ๊ทธ ์„ธ์…˜๊ณผ broadcast WEP key๋ฅผ ์„ธ์…˜์ด ์œ ์ง€๋˜๋Š” ๋™์•ˆ ๋ชจ๋“  ํ†ต์‹ ์—์„œ ์‚ฌ์šฉํ•ฉ๋‹ˆ๋‹ค.
๋” ๋งŽ์€ EAP ์ธ์ฆ ํƒ€์ž…(๋ฐฉ๋ฒ•)์ด ์žˆ์ง€๋งŒ AP๋Š” ๊ฐ๊ฐ ๋ฐฉ๋ฒ•์— ๊ฐ™์€ ๋ฐฉ๋ฒ•์œผ๋กœ ํ–‰๋™์„ ํ•ฉ๋‹ˆ๋‹ค: 
๊ทธ ๋ฐฉ๋ฒ•์€ ๋ฌด์„  ํด๋ผ์ด์–ธํŠธ ๋””๋ฐ”์ด์Šค์™€ RADIUS server๊ฐ„ ๊ต๋Œ€๋กœ ์ธ์ฆ ๋ฉ”์‹œ์ง€๋ฅผ ์ฃผ๊ณ  ๋ฐ›๋Š” ๋ฐฉ๋ฒ•์ž…๋‹ˆ๋‹ค. 
"Assigning Authentication Types to an SSID" ์„ ๋ณด์‹œ๋ฉด AP์—์„œ EAP๋ฅผ ์„ค์ •ํ•˜๋Š” ๋ฐฉ๋ฒ•์„ ๋ณด์‹ค ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค.

Eng

If you use EAP authentication, you can select open or shared key authentication, but you don't have to. 
EAP authentication controls authentication both to your access point and to your network.

Kor

๋งŒ์•ฝ EAP ์ธ์ฆ(Authentication)์„ ์‚ฌ์šฉํ•œ๋‹ค๋ฉด, key authentication์„ ๊ณต๊ฐœํ•  ๊ฒƒ์ธ์ง€ ๊ณต์œ ํ•  ๊ฒƒ์ธ์ง€ ์„ ํƒํ•  ์ˆ˜ ์žˆ์ง€๋งŒ, 
๊ทธ๋Ÿด ํ•„์š”๋Š” ์—†์–ด์š”. EAP ์ธ์ฆ์€ ๋‘๊ฐ€์ง€ ๋ฐฉ๋ฒ•์„ ๋ชจ๋‘ ์ œ๊ณตํ•˜๊ฑฐ๋“ ์š”. AP์™€ ๋‹น์‹ ์˜ network์—๊ฒŒ ๋ง์ด์ฃ .

Eng

If you don't have a RADIUS server on your network, you can create a list of allowed MAC addresses 
on the access point's Advanced Security: MAC Address Authentication page. 
Devices with MAC addresses not on the list are not allowed to authenticate.

Kor

๋งŒ์•ฝ RADIUS์„œ๋ฒ„๊ฐ€ ๋‹น์‹ ์˜ network์ƒ์— ์—†๋‹ค๋ฉด, ๋‹น์‹ ์€ AP์˜ Advanced Security(MAC Address Authentication page) 
์ƒ์˜ ํ• ๋‹น๋œ MAC ์ฃผ์†Œ ๋ชฉ๋ก์„ ์ƒ์„ฑํ•  ์ˆ˜ ์žˆ์Šต๋‹ˆ๋‹ค. MAC address์„ ๊ฐ€์ง€๊ณ  ์žˆ์Œ์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ  MAC ์ฃผ์†Œ ๋ชฉ๋ก์— ์—†๋Š” ์žฅ์น˜๋“ค์€ 
์ธ์ฆ์„ ํ—ˆ๊ฐ€ ๋ฐ›์ง€ ์•Š์€ ๊ฒ๋‹ˆ๋‹ค.

Eng

In Cisco IOS releases 12.3(4)JA and later, you cannot enable both MAC-address authentication and WPA-PSK.

Kor

12.3(4)JA ๊ทธ๋ฆฌ๊ณ  ๊ทธ ์ดํ›„ ๋ฒ„์ „์œผ๋กœ ์ถœ์‹œ๋œ Cisco IOS์—์„œ, ๋‹น์‹ ์€ MAC-address ์ธ์ฆ๊ณผ WPA-PSK์ธ์ฆ์„ ํ™œ์„ฑํ™” ํ•  ์ˆ˜ ์—†์Šต๋‹ˆ๋‹ค.

Eng

Unicast and multicast cipher suites advertised in WPA information element (and negotiated during 802.11 association) 
may potentially mismatch with the cipher suite supported in an explicitly assigned VLAN. 
If the RADIUS server assigns a new vlan ID which uses a different cipher suite from the previously negotiated cipher suite, 
there is no way for the access point and client to switch back to the new cipher suite. 
Currently, the WPA protocol do not allow the cipher suite to be changed after the initial 802.11 cipher negotiation phase. 
In this scenario, the client device is disassociated from the wireless LAN.

Kor

WPA information element์—์„œ ๋ช…์‹œ๋œ (๊ทธ๋ฆฌ๊ณ  802.11์—ฐํ•ฉ์—์„œ ํ˜‘์˜๋œ) Unicast ๋˜๋Š” Multicast ์•”ํ˜ธ ์ง‘ํ•ฉ(cipher suites) ๋“ค์€ 
์™„์ „ํžˆ ํ• ๋‹น๋œ VLAN ์•ˆ์—์„œ ์ง€์›๋˜๋Š” ์•”ํ˜ธ ์ง‘ํ•ฉ๋“ค๊ณผ ์ž ์žฌ์ ์œผ๋กœ ๋ถˆ์ผ์น˜ ํ•  ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ์Šต๋‹ˆ๋‹ค. 
๋งŒ์•ฝ RADIUS server๊ฐ€ ์ „์— ํ˜‘์ƒ๋œ ์•”ํ˜ธ ์ง‘ํ•ฉ๊ณผ ๋‹ค๋ฅธ ์•”ํ˜ธ ์ง‘ํ•ฉ์„ ์‚ฌ์šฉํ•˜๋Š” ์ƒˆ๋กœ์šด vlan ID๋ฅผ ํ• ๋‹นํ•œ๋‹ค๋ฉด 
AP์™€ client์˜ ์•”ํ˜ธ ์ง‘ํ•ฉ์„ ์ƒˆ๋กœ์šด ์•”ํ˜ธ ์ง‘ํ•ฉ์œผ๋กœ ๋ฐ”๊พธ๋Š” ๋ฐฉ๋ฒ•์€ ์—†์Šต๋‹ˆ๋‹ค.(์˜์—ญ)
ํ˜„์žฌ, WPA ํ”„๋กœํ† ์ฝœ์€ ์•”ํ˜ธ ์ง‘ํ•ฉ์„ ์ดˆ๊ธฐ์˜ 802.11 ์•”ํ˜ธ ํ˜‘์ƒ ๊ณผ์ • ํ›„์— ๋ฐ”๊พธ๋Š” ๊ฒƒ์„ ํ—ˆ๋ฝํ•˜์ง€ ์•Š์•˜์Šต๋‹ˆ๋‹ค. 
๊ฒฐ๊ตญ ์ด๋ ‡๊ฒŒ ๋˜๋ฉด, ํด๋ผ์ด์–ธํŠธ ๊ธฐ๊ธฐ๋Š” ๋ฌด์„  ๋žœ์œผ๋กœ ๋ถ€ํ„ฐ ๋ฏธ์—ฐ๊ฒฐ(disassociated)์ƒํƒœ๊ฐ€ ๋ฉ๋‹ˆ๋‹ค.

Eng

When you configure TKIP-only cipher encryption (not TKIP + WEP 128 or TKIP + WEP 40) on any radio interface or VLAN, 
every SSID on that radio or VLAN must be set to use WPA key management. 
If you configure TKIP on a radio or VLAN but you do not configure key management on the SSIDs, client authentication fails on the SSIDs.

Kor

์–ด๋–ค radio interface๋‚˜ vlan์—์„œ TKIP(TKIP + WEP 128 , TKIP + WEP 40๊ฐ™์€๊ฑฐ ๋ง๊ณ  ์ˆœ์ˆ˜ํ•œ TKIP) ์•”ํ˜ธํ™” ๋ฐฉ๋ฒ•์„ ์„ค์ •ํ•  ๋•Œ, 
๊ทธ radio๋‚˜ vlan์˜ ๋ชจ๋“  SSID ๋ฐ˜๋“œ์‹œ WPA key ๊ด€๋ฆฌ๋ฅผ ์‚ฌ์šฉํ•˜๋„๋ก ์„ค์ •ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค. 
๋งŒ์•ฝ radio ๋‚˜ VALN์˜  TKIP๋ฅผ ์„ค์ •ํ•˜๋Š”๋ฐ SSID๋“ค์˜ key management๋ฅผ ์„ค์ •ํ•˜์ง€ ์•Š๋Š”๋‹ค๋ฉด SSID์—์„œ client์ธ์ฆ์€ ์‹คํŒจํ•˜๊ฒŒ ๋ฉ๋‹ˆ๋‹ค.

Eng

Some non-Cisco Aironet client adapters do not perform 802.1x authentication 
to the access point unless you configure Open authentication with EAP. 
To allow both Cisco Aironet clients using LEAP and non-Cisco Aironet clients using LEAP to associate using the same SSID, 
you might need to configure the SSID for both Network EAP authentication and Open authentication with EAP.
Likewise, to allow both Cisco Aironet 802.11a/b/g client adapters (CB21AG and PI21AG) running EAP-FAST and 
non-Cisco Aironet clients using EAP-FAST or LEAP to associate using the same SSID, 
you might need to configure the SSID for both Network EAP authentication and Open authentication with EAP.

Kor

๋ช‡๋ช‡์˜ Cisco Aironet client๊ฐ€ ์•„๋‹Œ ์–ด๋Œ‘ํ„ฐ๋“ค์€ Open authenication with EAP๋ฅผ 
์„ค์ •ํ•˜์ง€ ์•Š์œผ๋ฉด AP 802.1x ์ธ์ฆ์„ ํ•˜์ง€ ๋ชปํ•ฉ๋‹ˆ๋‹ค. 
LEAP๋ฅผ ์‚ฌ์šฉํ•˜๋Š” Cisco Aironet client์™€ LEAP๋ฅผ ์‚ฌ์šฉํ•˜๋Š” non-Cisco Aironet client๊ฐ€ ๊ฐ™์€ SSID๋กœ ์‚ฌ์šฉํ•˜๋ฉด์„œ 
์—ฐ๊ฒฐํ•˜๊ฒŒ ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” Network EAP ์ธ์ฆ๊ณผ  Open authenication with EAP๋ฅผ SSID์— ์„ค์ •ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.
๊ฒŒ๋‹ค๊ฐ€, EAP-FAST์œ„์— ๋Œ์•„๊ฐ€๋Š” Cisco Aironet 802.11a/b/g client ์–ด๋Œ‘ํ„ฐ๋“ค( CB21AG,PI21AG)๊ณผ 
EAP-FAST๋‚˜ LEAP ์œ„์— ๋Œ์•„๊ฐ€๋Š” non-Cisco Aironet clients, ์ด ๋‘๊ฐœ์˜ Client๊ฐ€ ์„œ๋กœ ๊ฐ™์€ SSID๋ฅผ ์‚ฌ์šฉํ•˜๋ฉฐ ์—ฐ๊ฒฐ๋˜๋Š”๊ฒƒ์„ 
ํ—ˆ์šฉํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” ์ด๊ฒƒ๋˜ํ•œ Network EAP ์ธ์ฆ๊ณผ Open authenication with EAP๋ฅผ SSID์— ์„ค์ •ํ•ด์•ผ ํ•ฉ๋‹ˆ๋‹ค.  

Clone this wiki locally