USB Deviceserver User Manual Linux
Configuring EAP-TTLS
In EAP-TTLS (Tunneled Transport Layer Security), a TLS-protected tunnel is used for exchanging secrets. The meth-
od consists of two phases:
1. Outer authentication: An encrypted TLS (Transport Layer Security) tunnel is created between UTN server and
RADIUS server. To do this, the RADIUS server authenticates itself to the UTN server using a certificate that was
signed by a CA.
2. Inner authentication: In the tunnel the authentication (via CHAP, PAP, MS-CHAP, or MS-CHAPv2) takes place.
A user account for the UTN server is set up on the RADIUS server.
For increased security during connection establishment (optional): The root CA certificate of the certification
authority that has issued the certificate of the authentication server (RADIUS) is installed in the UTN server
66.
1. Start the utnserver Control Center.
2. Select SECURITY – Authentication.
3. Select TTLS from the Authentication method list.
4. Enter the user name and the password of the user account that is set up for the UTN server on the RADIUS
server.
5. Select the settings which secure the communication in the TLS channel.
6. Increase the security during connection establishment (optional):
From the list EAP root certificate, select the root CA certificate.
7. Click Save & Restart to confirm.
The settings will be saved.
Configuring PEAP
With PEAP (Protected Extensible Authentication Protocol), an encrypted TLS (Transport Layer Security) tunnel is
established between the UTN server and the RADIUS server. To do this, the RADIUS server authenticates itself to
the UTN server using a certificate that was signed by a CA. The TLS channel is then used to establish another con-
nection that can be protected by means of additional EAP authentication methods (e.g. MSCHAPv2).
The method is very similar to EAP-TTLS ( 72), but other methods are used to authenticate the UTN server.
A user account for the UTN server is set up on the RADIUS server.
For increased security during connection establishment (optional): The root CA certificate of the certification
authority that has issued the certificate of the authentication server (RADIUS) is installed in the UTN server
66.
1. Start the utnserver Control Center.
2. Select SECURITY – Authentication.
3. Select PEAP from the Authentication method list.
4. Enter the user name and the password of the user account that is set up for the UTN server on the RADIUS
server.
5. Select the settings which secure the communication in the TLS channel.
6. Increase the security during connection establishment (optional):
From the list EAP root certificate, select the root CA certificate.
7. Click Save & Restart to confirm.
The settings will be saved.
72
Need help?
Do you have a question about the myUTN utnserver Pro and is the answer not in the manual?