top of page

Welcome to Wireless buddies
Search


Validation of Radius Server Certificate and TLS Tunnel Establishment between Supplicant and Radius
1. The wireless laptop acts as a supplicant and authenticates using 802.1X. 2. The access point serves as the authenticator , converting the EAP protocol to the Radius protocol and forwarding it to the Radius server, and vice versa. 3. The Radius server validates the user's credentials. If the credentials are correct, a Radius Accept message with the appropriate return attributes is sent to the authenticator; otherwise, a Radius Reject message is sent. Â The Radius server va

Bhanu Prasad
Oct 212 min read
Â
Â
Â


How to Implement Role-Based Access Control Using a Pre-Shared Key SSID Without MAC Authentication?
Before reading the article, please note that all concepts are tested and explained using Alcatel-Lucent enterprise products. Â Â SSID With Pre-Shared Key The User device is associated with the Wireless access point using a pre-shared key(PSK). Once the correct pre-shared key is entered on the user device, it will obtain an IP address and gain access to the network/internet. Â Pros: Easy to use and typically used on Voice devices that do not support roaming standards Cons: All

Bhanu Prasad
Oct 65 min read
Â
Â
Â


SSID DISCOVERY IN 6GHz
if we use SSID Discovery in 6GHz traditional ways as in 2.4GHz or 5GHz, that is scanning every channel in 6GHz which will cause huge...

Bhanu Prasad
Feb 267 min read
Â
Â
Â


Wi-Fi 7 or 802.11 be
In this article what is Wi-Fi 7 as per my understanding and what all the features coming with the Standard, how to identify the devices...

Bhanu Prasad
Feb 84 min read
Â
Â
Â


DEAUTHENTICATION REASON CODE 6
The article is about my experience in the field. I saw Deauthentication (Deauth) frame with below reason. Anyone seeing above reason for...

Bhanu Prasad
Aug 21, 20232 min read
Â
Â
Â
RADIUS Attribute Proxy-State
RADIUS is a networking Protocol that provides AAA services and is commonly seen in any Enterprise network. In this article, we will...

Bhanu Prasad
Jun 11, 20222 min read
Â
Â
Â
Opportunistic Wireless Encryption(OWE)
Opportunistic Wireless Encryption (OWE) /enhanced open authentication helps secure the data to be precise encrypt data. If a...

Bhanu Prasad
Feb 22, 20222 min read
Â
Â
Â
Wireless Dauthentication / Diassociation Attacks
The Wireless Deauthentication /Disassociation frame sent by an AP to the user device is unicast. In the recent past, I visited one of my...

Bhanu Prasad
Sep 26, 20212 min read
Â
Â
Â
Transmit Beamforming
Transmit beamforming got introduced in 802.11n, which has two methods Implicit and Explicit beamforming. In 802.11ac, Explicit...

Bhanu Prasad
Jul 8, 20213 min read
Â
Â
Â
Evolution of 802.11 Physical layers
Today most of us know 802.11 ac or 802.11ax, which is used commonly with wireless. Let’s learn the Evolution of Wireless PHY’s and...

Bhanu Prasad
Jul 6, 20213 min read
Â
Â
Â
How user device know to restart the wireless connection?
People recently started to ask me how the user device like a Laptop / Mobile phone will restart the wireless connection (open...

Bhanu Prasad
May 28, 20212 min read
Â
Â
Â
Device Specific Pre-shared key or Multiple Pre-shared keys
We all know how Pre-Shared Key /WPA2-Personal SSID works, that is, One SSID one Pre-shared key. Anyone who knows the Pre-shared key (or...

Bhanu Prasad
Apr 4, 20212 min read
Â
Â
Â
802.1x Authentication in Wireless
802.1x Authentication is used to provide a Robust security network association. In 802.1x Authentication, we need to understand the below terminology. 1) Supplicant 2) Authenticator 3) Authentication Server The user device and the Authenticator use Extensible Authentication Protocol (EAP) for communication. The Authenticator and the Authentication server use the R emote Authentication Dial-In User Service (Radius) protocol for communication. Supplicant:

Bhanu Prasad
Mar 21, 20213 min read
Â
Â
Â
Symmetric vs. Asymmetric Algorithm.
Let's understand the terminology and the functionality difference between the Symmetric and Asymmetric Algorithms in simple terms....

Bhanu Prasad
Mar 14, 20212 min read
Â
Â
Â
Captive Portal Information Flow
In this article, we will see the Captive portal HTTP/Radius information flow as below. Note: I did not include the DNS information flow...

Bhanu Prasad
Mar 7, 20212 min read
Â
Â
Â
WPA3-Simultaneous Authentication of Equals(SAE)
Let's try to understand how WPA3-SAE generates PMK for each user and helps the user secure from not becoming prey for brute force and...

Bhanu Prasad
Mar 6, 20211 min read
Â
Â
Â
Wireless Terminology
SSID – Service Set Identifier (SSID) is the set of characters broadcasted by the Access point, and the user device connects to SSID to...

Bhanu Prasad
Mar 3, 20215 min read
Â
Â
Â
Best Practices In Wireless LAN Deployment
We always hear that most wireless problems are due to design, and I totally agree with that. I want to share best practices from my field...

Bhanu Prasad
Feb 27, 20215 min read
Â
Â
Â
Wireless connection is Slow?
Modulation and Coding Scheme value is directly proportional to the client speed. ( check the website www.mcsindex.com ) Modulation and...

Bhanu Prasad
Feb 16, 20211 min read
Â
Â
Â
Roaming in Wireless
The seamless transition of the User device from one Access Point to another access point called Roaming. For Example, let’s assume you...

Bhanu Prasad
Feb 15, 20214 min read
Â
Â
Â
Contact
bottom of page
