Planet XGS3-42000R User Manual page 475

4-slot layer 3 ipv6/ ipv4 routing chassis switch
Table of Contents

Advertisement

4.
PEAP Authentication Method
EAP-PEAP is brought up by Cisco, Microsoft and RAS Security as a recommended open standard. It has long
been utilized in products and provides very good sec urity. Its design of protocol and security is similar to that
of EAP-TTLS, using a server's PKI certificate to establish a safe TLS tunnel in order to protect user
authentication.
The following figure illustrates the basic operation flow of PEAP authentication met hod.
the Authentication Flow of 802.1x PEAP
Figure 47-1-11
47.1.6.2 EAP Termination Mode
In this mode, EAP messages will be terminated in the access control unit and mapped into RA DIUS
messages, which is used to implement the authentication, authorization and fee-counting. The basic
operation flow is illustrated in the next figure.
In EAP termination mode, the access control unit and the RA DIUS server can use PAP or CHAP
authentication method. The following figure will demonstrate the basic operation flow using CHAP
authentication method.
47-10

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents