Eap Authentication; Eap Characteristics - AMX MVP-5100 Operation/Reference Manual

Hide thumbs Also See for MVP-5100:
Table of Contents

Advertisement

Appendix B: Wireless Technology

EAP Authentication

EAP (Extensible Authentication Protocol) is an Enterprise authentication protocol that can be used in both a
wired and wireless network environment. EAP requires the use of an 802.1x Authentication Server, also
known as a RADIUS server. Although over 40 different EAP methods are currently defined, the current
internal Modero 802.11g wireless card and accompanying firmware only support the following EAP methods
(listed from simplest to most complex):


The following use certificates:



EAP requires the use of an 802.1x authentication server (also known as a RADIUS server). Sophisticated
Access Points (such as Cisco) can use a built-in RADIUS server. The most common RADIUS servers used in
wireless networks today are:






EAP Characteristics

The following table outlines the differences among the various EAP Methods from most secure (at the top of
the list) to the least secure (at the bottom of the list):
EAP Method Characteristics
Method:
EAP-TLS
EAP-TTLS
EAP-PEAP
EAP-LEAP
EAP-FAST
168
EAP-LEAP (Cisco Light EAP)
EAP-FAST (Cisco Flexible Authentication via Secure Tunneling, a.k.a. LEAPv2)
EAP-PEAP (Protected EAP)
EAP-TTLS (Tunneled Transport Layer Security)
EAP-TLS (Transport Layer Security)
Microsoft Sever 2003
Juniper Odyssey (once called Funk Odyssey)
Meetinghouse AEGIS Server
DeviceScape RADIUS Server
Cisco Secure ACS
Credential Type:
• Certificates
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
Authentication:
Pros:
• Certificate is based on a
• Highest
two-way authentication
• Client authentication is
• High Security
done via password and
certificates
• Server authentication is
done via certificates
• Client authentication is
• High Security
done via password and
certificates
• Server authentication is
done via certificates
• Authentication is based on
• Easy
MS-CHAP and
MS-CHAPv2
authentication protocols
• N/A
• N/A
MVP-5100/5150 5.2" Modero Viewpoint Touch Panels
Cons:
• Difficult to
Security
deploy
• Moderately
difficult to
deploy
• Moderately
difficult to
deploy
• Susceptible to
deployment
dictionary
attacks
• N/A

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mvp-5150

Table of Contents