![]() ![]() PEAP will form a potentially encrypted TLS tunnel between the client and server, using the x.509 certificate on the server in much the same way the SSL tunnel is established between a web browser and a secure website. PEAP aka Protected EAP: Originally proposed by Microsoft, this EAP Tunnel type has quickly become the most popular and widely deployed EAP method in the world.Native EAP (nontunneled EAP): EAP-TLS, EAP-MD5. The EAP types can be broken down into two categories: native EAP types and tunneled EAP types. There are many EAP types, and each one has its own benefit and downside. How EAP is transported over RADIUS is defined by RFC3579. For the link between the authenticator and the authentication server, the EAP packets are fragmented on 253-byte boundaries and split into multiple EAP-Message attributes. The most common transports between the supplicant and the authenticator is EAPOL. Remember: EAP is always carried by another protocol. The authentication server is a trusted server (for instance Cisco Identity Services Engine) that receive and respond to requests for network access, and can decide if the connection is to be allowed or not.The authenticator is a network device which provides a data link between the client and the network and can allow or block network traffic between the two, such as an switch or access point.The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |