top of page

Welcome to Wireless buddies
Search


Validation of Radius Server Certificate and TLS Tunnel Establishment between Supplicant and Radius
1. The wireless laptop acts as a supplicant and authenticates using 802.1X. 2. The access point serves as the authenticator , converting the EAP protocol to the Radius protocol and forwarding it to the Radius server, and vice versa. 3. The Radius server validates the user's credentials. If the credentials are correct, a Radius Accept message with the appropriate return attributes is sent to the authenticator; otherwise, a Radius Reject message is sent. The Radius server va

Bhanu Prasad
Oct 21, 20252 min read


How to Implement Role-Based Access Control Using a Pre-Shared Key SSID Without MAC Authentication?
Before reading the article, please note that all concepts are tested and explained using Alcatel-Lucent enterprise products. SSID With Pre-Shared Key The User device is associated with the Wireless access point using a pre-shared key(PSK). Once the correct pre-shared key is entered on the user device, it will obtain an IP address and gain access to the network/internet. Pros: Easy to use and typically used on Voice devices that do not support roaming standards Cons: All

Bhanu Prasad
Oct 6, 20255 min read


SSID DISCOVERY IN 6GHz
if we use SSID Discovery in 6GHz traditional ways as in 2.4GHz or 5GHz, that is scanning every channel in 6GHz which will cause huge...

Bhanu Prasad
Feb 26, 20257 min read


Wi-Fi 7 or 802.11 be
In this article what is Wi-Fi 7 as per my understanding and what all the features coming with the Standard, how to identify the devices...

Bhanu Prasad
Feb 8, 20254 min read


DEAUTHENTICATION REASON CODE 6
The article is about my experience in the field. I saw Deauthentication (Deauth) frame with below reason. Anyone seeing above reason for...

Bhanu Prasad
Aug 21, 20232 min read
RADIUS Attribute Proxy-State
RADIUS is a networking Protocol that provides AAA services and is commonly seen in any Enterprise network. In this article, we will...

Bhanu Prasad
Jun 11, 20222 min read
Opportunistic Wireless Encryption(OWE)
Opportunistic Wireless Encryption (OWE) /enhanced open authentication helps secure the data to be precise encrypt data. If a...

Bhanu Prasad
Feb 22, 20222 min read
Wireless Dauthentication / Diassociation Attacks
The Wireless Deauthentication /Disassociation frame sent by an AP to the user device is unicast. In the recent past, I visited one of my...

Bhanu Prasad
Sep 26, 20212 min read
Transmit Beamforming
Transmit beamforming got introduced in 802.11n, which has two methods Implicit and Explicit beamforming. In 802.11ac, Explicit...

Bhanu Prasad
Jul 8, 20213 min read
Evolution of 802.11 Physical layers
Today most of us know 802.11 ac or 802.11ax, which is used commonly with wireless. Let’s learn the Evolution of Wireless PHY’s and...

Bhanu Prasad
Jul 6, 20213 min read
How user device know to restart the wireless connection?
People recently started to ask me how the user device like a Laptop / Mobile phone will restart the wireless connection (open...

Bhanu Prasad
May 28, 20212 min read
Device Specific Pre-shared key or Multiple Pre-shared keys
We all know how Pre-Shared Key /WPA2-Personal SSID works, that is, One SSID one Pre-shared key. Anyone who knows the Pre-shared key (or...

Bhanu Prasad
Apr 4, 20212 min read
802.1x Authentication in Wireless
802.1x Authentication is used to provide a Robust security network association. In 802.1x Authentication, we need to understand the below terminology. 1) Supplicant 2) Authenticator 3) Authentication Server The user device and the Authenticator use Extensible Authentication Protocol (EAP) for communication. The Authenticator and the Authentication server use the R emote Authentication Dial-In User Service (Radius) protocol for communication. Supplicant:

Bhanu Prasad
Mar 21, 20213 min read
Symmetric vs. Asymmetric Algorithm.
Let's understand the terminology and the functionality difference between the Symmetric and Asymmetric Algorithms in simple terms....

Bhanu Prasad
Mar 14, 20212 min read
Captive Portal Information Flow
In this article, we will see the Captive portal HTTP/Radius information flow as below. Note: I did not include the DNS information flow...

Bhanu Prasad
Mar 7, 20212 min read
WPA3-Simultaneous Authentication of Equals(SAE)
Let's try to understand how WPA3-SAE generates PMK for each user and helps the user secure from not becoming prey for brute force and...

Bhanu Prasad
Mar 6, 20211 min read
Wireless Terminology
SSID – Service Set Identifier (SSID) is the set of characters broadcasted by the Access point, and the user device connects to SSID to...

Bhanu Prasad
Mar 3, 20215 min read
Best Practices In Wireless LAN Deployment
We always hear that most wireless problems are due to design, and I totally agree with that. I want to share best practices from my field experience in WLAN deployment, and I hope it helps. Wireless capacity and coverage are two essential concepts. However, having good coverage does not necessarily mean that all devices connected to the Access point will have better throughput. Typically, we plan 25 -30 devices per Access point in staff rooms and around 45-50 devices per acce

Bhanu Prasad
Feb 27, 20216 min read
Wireless connection is Slow?
Modulation and Coding Scheme value is directly proportional to the client speed. ( check the website www.mcsindex.com ) Modulation and...

Bhanu Prasad
Feb 16, 20211 min read
Roaming in Wireless
The seamless transition of the User device from one Access Point to another access point called Roaming. For Example, let’s assume you...

Bhanu Prasad
Feb 15, 20214 min read
Contact
bottom of page
