Security
myUTN User Manual Windows
101
6.8
How to Use Authentication Methods
By means of an authentication, a network can be protected against
unauthorized access. The UTN server can participate in various
authentication procedures. This section describes which procedures
are supported and how these procedures are configured on the UTN
server.
What is IEEE 802.1X?
The IEEE 802.1X standard provides a basic structure for various
authentication and key management protocols. IEEE 802.1X allows
you to control the access to networks. Before users gain access to a
network via a network device, they must authenticate themselves in
the network. After the authentication was successful, the access to
the network will be freed.
What is EAP?
The standard IEEE 802.1X is based upon the EAP (Extensible Authen-
tication Protocol). EAP is a universal protocol for many authentica-
tion procedures. EAP allows for a standardized authentication
procedure between the network device and an authentication server
(RADIUS). First you must define the authentication procedure (TLS,
PEAP, TTLS, etc.) to be used and configure it on all network devices
involved.
What is RADIUS?
RADIUS (Remote Authentication Dial-In User Service) is an authen-
tication and account management system that validates user login
information and grants access to the desired resources.
The UTN server supports various EAP authentication methods in
order to authenticate itself in a protected network.
What Do You Want
To Do?