CLICK OKTO ACCEPT THE CHANGES
14. Click OKto accept the changes.
Authentication with WEP
There are two authentication methods in the 802.11 standard:■
Open authentication■
Shared-key authenticationOpen authenticationis most precisely described as device-oriented authenti-cation and can be considered a null authentication; all requests are granted.Without WEP, open authentication leaves the WLAN wide open to any client whoknows the SSID. With WEP enabled, the WEP secret key becomes the indirectauthenticator. The shared-key authenticationprocess shown in Figure 9.6 is a four-step pro-