Nowadays, the WIFI networks are very extended in enterprises. In case that an enterprise wants to centralize or delegate the authentication of its wireless stations against an access point, one can think about Radius as the first solution.
The Radius authentication server in charge of validating the credentials of these wireless stations will be placed in a LAN (Local Area Network). How secure is this method of authentication if someone with malicious intentions has access to this network? Can this person compromise the authentication process by carrying out a Man in The Middle Attack and then intercepting and modifying the content of the RADIUS packets intended to the authentication server?
This document will answer all these questions and some others that the reader may wonder when taking into detail about the Radius and EAP protocols.
To download the entire document click here