Security
TPR User Manual
80
Configuring PEAP
Benefits and
Purpose
PEAP (Protected Extensible Authentication Protocol) validates the
identity of devices or users before they gain access to network
resources. You can configure the TPR for the PEAP network
authentication. This makes sure that the TPR gets access to
protected networks.
Mode of Operation
In the case of PEAP (compare EAP-TTLS, see
TLS (Transport Layer Security) channel is established between the
TPR and the RADIUS server. Only the RADIUS server authenticates
itself on the TPR using a certificate that was signed by a CA.
The TLS channel is then used to establish another connection that
can be protected by means of additional EAP authentication
methods (e.g. MSCHAPv2).
The advantage of this procedure is that only the RADIUS server
needs a certificate. Therefore no PKI is needed. PEAP uses the
advantages of TLS and supports various authentication methods,
including user passwords and one-time passwords.
Requirements
The TPR is defined as user (with user name and password) on a
RADIUS server.
Proceed as follows:
1. Start the TPR Control Center.
2. Select
SECURITY – Authentication
.
3. Select
PEAP
from the
Authentication method
list.
4. Enter the user name and the password that are used for the
configuration of the TPR on the RADIUS server.
5. Select the settings intended to secure the communication in the
TLS channel.
6. To make the connection more secure, you can also install the
root CA certificate of the certification authority that has issued
the certificate of the authentication server (RADIUS) on the TPR;
see:
Afterwards, select the root CA certificate from the list
EAP root
certificate.