Table 30 Comparison Of Eap Authentication Types - ZyXEL Communications ZyAIR G-220 User Manual

802.11g wireless usb adapter
Hide thumbs Also See for ZyAIR G-220:
Table of Contents

Advertisement

ZyAIR G-220 User's Guide
PEAP (Protected EAP)
Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection,
then use simple username and password methods through the secured connection to
authenticate the clients, thus hiding client identity. However, PEAP only supports EAP
methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card),
for client authentication. EAP-GTC is implemented only by Cisco.
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE
802.1x. For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and
PEAP) use dynamic keys for data encryption. They are often deployed in corporate
environments, but for public deployment, a simple user name and password pair is more
practical.
The following table is a comparison of the features of five authentication types.

Table 30 Comparison of EAP Authentication Types

Mutual
Authentication
Certificate – Client
Certificate – Server
Dynamic Key
Exchange
Credential Integrity
Deployment Difficulty Easy
Client Identity
Protection
91
EAP-MD5
EAP-TLS
No
Yes
No
Yes
No
Yes
No
Yes
None
Strong
Hard
No
No
EAP-TTLS
PEAP
Yes
Yes
Optional
Optional
Yes
Yes
Yes
Yes
Strong
Strong
Moderate
Moderate
Yes
Yes
Appendix E Types of EAP Authentication
LEAP
Yes
No
No
Yes
Moderate
Moderate
No

Advertisement

Table of Contents
loading

Table of Contents