You mentioned about "MAC address based authentication for non-USIM devices", how that would work ?
How you address concerns like MAC cloning ?
Best Regards,
Rajesh
Netmanias2015-03-02 15:06:12
Hi Rajesh,
'MAC address-based authentication' is performed during 802.11 association procedure. So, after Step 3 in Figure 1 above, the AP sends the MAC address of the station via Access Request message to AAA, where the MAC address is already provisioned. Then, AAA begins authentication based on the provisioned information, and then forwards the result to the AP via Access Accept/Access Reject message.
As you pointed out, it is impossible to prevent MAC cloning in this type of authentication, unfortunately. However, because AAA collects accounting information of stations that are accessing it (that is, as AAA knows whether a station at a specific MAC addresses has accessed it or not), it can at least prevent multiple stations from making a request for authentication using the same MAC address.
Thanks,
Netmanias.com
Harishankar2015-03-09 15:52:58
Hi,
Does the Korean operators uses HS2.0 based solution for auto-login when in Wifi coverage without user intervention?
Do these operators consider the Wifi network as trusted or untrusted domain? IS there any dependency on the handset for such a solution?
What if the KT subscribers roams in US for example. Will he be able to use the KT wifi roaming?
Regards,
Harishankar
David Kim2015-03-09 18:54:49
KT provides hotspot 2.0 service with the following roaming partners:
Does it work for non-SIM based devices like Tablets? How authentication works for that case?
David Kim2015-03-12 09:29:56
According to Hotspot 2.0, devices without SIM/USIM card can be authenticated using EAP-TLS or EAP-TTLS. But, as far as I know KT does not support this EAP-TLS/EAP-TTLS authentication, but features roaming that uses captive portal-based ID/PW authentication, instead.
Simply put, current KT subscribers can access Wi-Fi:
in 4 different operators' networks in 3 countries by using a device with a SIM/USIM card through EAP-AKA authentication procedure, or
in about 100 countries by using any device (with or without SIM/USIM card) through captive portal/WISPr.
Rajesh Desisetti2019-09-30 18:28:55
Hi,
Please share Dot1x and Mab authentication with AAA and dynamic ACL feature.
Thank you for visiting Netmanias! Please leave your comment if you have a question or suggestion.
Hi,
You mentioned about "MAC address based authentication for non-USIM devices", how that would work ?
How you address concerns like MAC cloning ?
Best Regards,
Rajesh
Hi Rajesh,
'MAC address-based authentication' is performed during 802.11 association procedure. So, after Step 3 in Figure 1 above, the AP sends the MAC address of the station via Access Request message to AAA, where the MAC address is already provisioned. Then, AAA begins authentication based on the provisioned information, and then forwards the result to the AP via Access Accept/Access Reject message.
As you pointed out, it is impossible to prevent MAC cloning in this type of authentication, unfortunately. However, because AAA collects accounting information of stations that are accessing it (that is, as AAA knows whether a station at a specific MAC addresses has accessed it or not), it can at least prevent multiple stations from making a request for authentication using the same MAC address.
Thanks,
Netmanias.com
Hi,
Does the Korean operators uses HS2.0 based solution for auto-login when in Wifi coverage without user intervention?
Do these operators consider the Wifi network as trusted or untrusted domain? IS there any dependency on the handset for such a solution?
What if the KT subscribers roams in US for example. Will he be able to use the KT wifi roaming?
Regards,
Harishankar
KT provides hotspot 2.0 service with the following roaming partners:
NTT DoCoMo (Japan), CMCC (China), PCCW (China), Chunghwa Telecom (Taiwan)
- Authentication protocol: EAP-AKA
- Supported device: smartphone (Android, iOS), iPad with cellular interface
You can find article in link below:
http://www.kt.com/eng/pr/news_01.jsp (type the 'automatic roaming' in the serach box)
Thanks for the reply.
Does it work for non-SIM based devices like Tablets? How authentication works for that case?
According to Hotspot 2.0, devices without SIM/USIM card can be authenticated using EAP-TLS or EAP-TTLS. But, as far as I know KT does not support this EAP-TLS/EAP-TTLS authentication, but features roaming that uses captive portal-based ID/PW authentication, instead.
Simply put, current KT subscribers can access Wi-Fi:
Hi,
Please share Dot1x and Mab authentication with AAA and dynamic ACL feature.