Eap Authentication; Eap Characteristics - AMX MVP-9000i Operation And Reference Manual

9" modero viewpoint touch panel with intercom
Hide thumbs Also See for MVP-9000i:
Table of Contents

Advertisement

Appendix B: Wireless Technology

EAP Authentication

EAP (Extensible Authentication Protocol) is an Enterprise authentication protocol that can be used in both a wired and
wireless network environment. EAP requires the use of an 802.1x Authentication Server, also known as a RADIUS
server. Although over 40 different EAP methods are currently defined, the current internal Modero 802.11a/b/g wireless
card and accompanying firmware only support the following EAP methods (listed from simplest to most complex):


The following use certificates:



EAP requires the use of an 802.1x authentication server (also known as a RADIUS server). The most common RADIUS
servers used in wireless networks today are:






EAP Characteristics

The following table outlines the differences among the various EAP Methods from most secure (at the top of the list) to
the least secure (at the bottom of the list):
EAP Method Characteristics
Method:
EAP-TLS
EAP-TTLS
EAP-PEAP
EAP-LEAP
EAP-FAST
178
EAP-LEAP (Cisco Light EAP)
EAP-FAST (Cisco Flexible Authentication via Secure Tunneling, a.k.a. LEAPv2)
EAP-PEAP (Protected EAP)
EAP-TTLS (Tunneled Transport Layer Security)
EAP-TLS (Transport Layer Security)
Microsoft Sever 2003
Juniper Odyssey (once called Funk Odyssey)
Meetinghouse AEGIS Server
Devicescape RADIUS Server
Cisco Secure ACS
Credential Type:
• Certificates
• Certificates
• Fixed Passwords
• One-time passwords (tokens)
• Certificates
• Fixed Passwords
• One-time passwords (tokens)
• Certificates
• Fixed Passwords
• One-time passwords (tokens)
• Certificates
• Fixed Passwords
• One-time passwords (tokens)
Authentication:
Pros:
• Certificate is based on a
• Highest
two-way authentication
• Client authentication is
• High Security
done via password and
certificates
• Server authentication is
done via certificates
• Client authentication is
• High Security
done via password and
certificates
• Server authentication is
done via certificates
• Authentication is based
• Easy
on MS-CHAP and
MS-CHAPv2
authentication protocols
• N/A
• N/A
MVP-9000i 9" Modero® ViewPoint® Touch Panel with Intercom
Cons:
• Difficult to
Security
deploy
• Moderately
difficult to
deploy
• Moderately
difficult to
deploy
• Susceptible
deployment
to dictionary
attacks
• N/A

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents