Eap Authentication; Eap Characteristics - AMX NXT-CV10 Operation/Reference Manual

10" modero touch panel
Hide thumbs Also See for NXT-CV10:
Table of Contents

Advertisement

Appendix B - Wireless Technology

EAP Authentication

EAP (Extensible Authentication Protocol) is an Enterprise authentication protocol that can be used in both a
wired and wireless network environment. EAP requires the use of an 802.1x Authentication Server, also
known as a Radius server. Although there are currently over 40 different EAP methods defined, the current
internal Modero 802.11g wireless card and accompanying firmware only support the following EAP methods
(listed from simplest to most complex):


The following use certificates:



EAP requires the use of an 802.1x authentication server (also known as a Radius server). Sophisticated Access
Points (such as Cisco) can use a built-in Radius server. The most common RADIUS servers used in wireless
networks today are:






EAP characteristics

The following table outlines the differences among the various EAP Methods from most secure (at the top) to
the least secure (at the bottom of the list):
EAP Method Characteristics
Method:
EAP-TLS
EAP-TTLS
EAP-PEAP
EAP-LEAP
EAP-FAST
184
EAP-LEAP (Cisco Light EAP)
EAP-FAST (Cisco Flexible Authentication via Secure Tunneling, a.k.a. LEAPv2)
EAP-PEAP (Protected EAP)
EAP-TTLS (Tunneled Transport Layer Security)
EAP-TLS (Transport Layer Security)
Microsoft Sever 2003
Juniper Odyssey (once called Funk Odyssey)
Meetinghouse AEGIS Server
DeviceScape RADIUS Server
Cisco Secure ACS
Credential Type:
• Certificates
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
Authentication:
Pros:
• Certificate is based on a
• Highest
two-way authentication
• Client authentication is
• High Security
done via password and
certificates
• Server authentication is
done via certificates
• Client authentication is
• High Security
done via password and
certificates
• Server authentication is
done via certificates
• Authentication is based on
• Easy
MS-CHAP and
MS-CHAPv2
authentication protocols
• N/A
• N/A
Cons:
• Difficult to
Security
deploy
• Moderately
difficult to
deploy
• Moderately
difficult to
deploy
• Susceptible to
deployment
dictionary
attacks
• N/A
10" Modero Touch Panels

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nxd-cv10

Table of Contents