Security
TPR User Manual
76
7.7
How to Use Authentication Methods
By means of an authentication, a network can be protected against
unauthorized access. The TPR can participate in various
authentication procedures. This section describes which procedures
are supported and how these procedures are configured on the TPR.
What is IEEE 802.1X?
The IEEE 802.1X standard provides a basic structure for various
authentication and key management protocols. IEEE 802.1X allows
you to control the access to networks. Before users gain access to a
network via a network device, they must authenticate themselves in
the network. After the authentication was successful, the access to
the network will be freed.
What is EAP?
The standard IEEE 802.1X is based upon the EAP (Extensible
Authentication Protocol). EAP is a universal protocol for many
authentication procedures. EAP allows for a standardized
authentication procedure between the network device and an
authentication server (RADIUS). First you must define the
authentication procedure (TLS, PEAP, TTLS, etc.) to be used and
configure it on all network devices involved.
What is RADIUS?
RADIUS (Remote Authentication Dial-In User Service) is an
authentication and account management system that validates user
login information and grants access to the desired resources.
The TPR supports various EAP authentication methods in order to
authenticate itself in a protected network.
What do you want
to do?