
802.1x Configuration
422
open standard. It has long been utilized in products and provides very good security. Its
design of protocol and security is similar to that of EAP-
TTLS, using a server‘s PKI
certificate to establish a safe TLS tunnel in order to protect user authentication.
The following figure illustrates the basic operation flow of PEAP authentication
method.
Fig 47-11 the Authentication Flow of 802.1x PEAP
47.1.5.2
EAP Termination Mode
In this mode, EAP messages will be terminated in the access control unit and
mapped into RADIUS messages, which is used to implement the authentication,
authorization and fee-counting. The basic operation flow is illustrated in the next figure.
In EAP termination mode, the access control unit and the RADIUS server can use
PAP or CHAP authentication method. The following figure will demonstrate the basic
operation flow using CHAP authentication method.