Motorola RD5000 Integrator Manual page 80

Rfid reader
Table of Contents

Advertisement

5 - 10 RD5000 RFID Integrator Guide
Select a tunneled authentication type from the drop-down list. See
1.
Select the
2.
User Certificate
certificate, the check box is already selected.
Click
. The
3.
Next
Table 5-8
lists the PEAP tunneled authentication options.
PEAP Tunneled Authentication Options
Table 5-8
PEAP Tunneled
Authentication
MS CHAP v2
TLS
Table 5-9
lists the TTLS tunneled authentication options.
TTLS Tunneled Authentication Options
Table 5-9
TTLS Tunneled
Authentication
CHAP
MS CHAP
check box if a certificate is required. If the TLS tunnel type selected requires a user
dialog box appears.
Installed User Certificates
Microsoft Challenge Handshake Authentication Protocol version 2 (MS CHAP v2) is a
password-based, challenge-response, mutual authentication protocol that uses the
industry-standard Message Digest 4 (MD4) and Data Encryption Standard (DES) algorithms
to encrypt responses. The authenticating server challenges the access client and the access
client challenges the authenticating server. If either challenge is not correctly answered, the
connection is rejected. MS CHAP v2 was originally designed by Microsoft as a PPP
authentication protocol to provide better protection for dial-up and virtual private network
(VPN) connections. With Windows XP SP1, Windows XP SP2, Windows Server 2003, and
Windows 2000 SP4, MS CHAP v2 is also an EAP type.
EAP TLS is used during phase 2 of the authentication process. This method uses a user
certificate to authenticate.
Challenge Handshake Authentication Protocol (CHAP) is one of the two main
authentication protocols used to verify the user name and password for PPP Internet
connections. CHAP is more secure than PAP because it performs a three way handshake
during the initial link establishment between the home and remote machines. It can also
repeat the authentication anytime after the link is established.
Microsoft Challenge Handshake Authentication Protocol (MS CHAP) is an
implementation of the CHAP protocol that Microsoft created to authenticate remote
Windows workstations. MS CHAP is identical to CHAP, except that MS CHAP is based
on the encryption and hashing algorithms used by Windows networks, and the MS CHAP
response to a challenge is in a format optimized for compatibility with Windows operating
systems.
Table 5-8
and
Table
Description
Description
5-9.

Advertisement

Table of Contents
loading

Table of Contents