Eap Authentication; Eap Characteristics - AMX Modero ViewPoint MVP-8400i Operation/Reference Manual

8.4" modero viewpoint touch panel with intercom
Hide thumbs Also See for Modero ViewPoint MVP-8400i:
Table of Contents

Advertisement

EAP Authentication

EAP (Extensible Authentication Protocol) is an Enterprise authentication protocol that can be used in
both a wired and wireless network environment. EAP requires the use of an 802.1x Authentication
Server, also known as a Radius server. Although there are currently over 40 different EAP methods
defined, the current internal Modero 802.11g wireless card and accompanying firmware only support the
following EAP methods (listed from simplest to most complex):


The following use certificates:



EAP requires the use of an 802.1x authentication server (also known as a Radius server). Sophisticated
Access Points (such as Cisco) can use a built-in Radius server. The most common RADIUS servers used
in wireless networks today are:






EAP characteristics

The following table outlines the differences among the various EAP Methods from most secure (at the
top) to the least secure (at the bottom of the list):
EAP Method Characteristics
Method:
EAP-TLS
EAP-TTLS
EAP-PEAP
EAP-LEAP
EAP-FAST
MVP-8400i 8.4" Modero® ViewPoint® Touch Panel with Intercom
EAP-LEAP (Cisco Light EAP)
EAP-FAST (Cisco Flexible Authentication via Secure Tunneling, a.k.a. LEAPv2)
EAP-PEAP (Protected EAP)
EAP-TTLS (Tunneled Transport Layer Security)
EAP-TLS (Transport Layer Security)
Microsoft Sever 2003
Juniper Odyssey (once called Funk Odyssey)
Meetinghouse AEGIS Server
DeviceScape RADIUS Server
Cisco Secure ACS
Credential Type:
• Certificates
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
• Certificates
• Fixed Passwords
• One-time passwords
(tokens)
Authentication:
Pros:
• Certificate is based on a 
• Highest
two-way authentication
• Client authentication is
• High Security
done via password and
certificates
• Server authentication is
done via certificates
• Client authentication is
• High Security
done via password and
certificates
• Server authentication is
done via certificates
• Authentication is based on
• Easy
MS-CHAP and 
MS-CHAPv2
authentication protocols
• N/A
• N/A
Appendix B - Wireless Technology
Cons:
• Difficult to
Security
deploy
• Moderately 
difficult to
deploy
• Moderately 
difficult to
deploy
• Susceptible to
deployment
dictionary
attacks
• N/A
185

Advertisement

Table of Contents
loading

Table of Contents