
P-661H/HW Series User’s Guide
Appendix K
363
PEAP (Protected EAP)
Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection,
then use simple username and password methods through the secured connection to
authenticate the clients, thus hiding client identity. However, PEAP only supports EAP
methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card),
for client authentication. EAP-GTC is implemented only by Cisco.
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE
802.1x.
Dynamic WEP Key Exchange
The AP maps a unique key that is generated with the RADIUS server. This key expires when
the wireless connection times out, disconnects or reauthentication times out. A new WEP key
is generated each time reauthentication is performed.
If this feature is enabled, it is not necessary to configure a default encryption key in the
Wireless screen. You may still configure and store keys here, but they will not be used while
Dynamic WEP is enabled.
Note:
EAP-MD5 cannot be used with Dynamic WEP Key Exchange
For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use
dynamic keys for data encryption. They are often deployed in corporate environments, but for
public deployment, a simple user name and password pair is more practical. The following
table is a comparison of the features of authentication types.
Table 166
Comparison of EAP Authentication Types
EAP-MD5
EAP-TLS
EAP-TTLS
PEAP
LEAP
Mutual Authentication
No
Yes
Yes
Yes
Yes
Certificate – Client
No
Yes
Optional
Optional
No
Certificate – Server
No
Yes
Yes
Yes
No
Dynamic Key Exchange
No
Yes
Yes
Yes
Yes
Credential Integrity
None
Strong
Strong
Strong
Moderate
Deployment Difficulty
Easy
Hard
Moderate
Moderate
Moderate
Client Identity Protection
No
No
Yes
Yes
No
Summary of Contents for P-661H Series
Page 2: ......
Page 5: ...P 661H HW Series User s Guide Certifications 5...
Page 10: ...P 661H HW Series User s Guide 10 Customer Support...
Page 44: ...P 661H HW Series User s Guide 44 Chapter 1 Getting To Know Your ZyXEL Device...
Page 76: ...P 661H HW Series User s Guide 76 Chapter 3 Wizards...
Page 108: ...P 661H HW Series User s Guide 108 Chapter 5 LAN Setup...
Page 132: ...P 661H HW Series User s Guide 132 Chapter 6 Wireless LAN...
Page 192: ...P 661H HW Series User s Guide 192 Chapter 10 Trend Micro Security Services...
Page 196: ...P 661H HW Series User s Guide 196 Chapter 11 Content Filtering...
Page 202: ...P 661H HW Series User s Guide 202 Chapter 12 Introduction to IPSec...
Page 230: ...P 661H HW Series User s Guide 230 Chapter 13 VPN Screens...
Page 234: ...P 661H HW Series User s Guide 234 Chapter 14 Static Route...
Page 246: ...P 661H HW Series User s Guide 246 Chapter 15 Bandwidth Management...
Page 250: ...P 661H HW Series User s Guide 250 Chapter 16 Dynamic DNS Setup...
Page 280: ...P 661H HW Series User s Guide 280 Chapter 19 System...
Page 290: ...P 661H HW Series User s Guide 290 Chapter 21 Tools...
Page 296: ...P 661H HW Series User s Guide 296 Chapter 23 Troubleshooting...
Page 300: ...P 661H HW Series User s Guide 300 Appendix A...
Page 304: ...P 661H HW Series User s Guide 304 Appendix C...
Page 326: ...P 661H HW Series User s Guide 326 Appendix E...
Page 328: ...P 661H HW Series User s Guide 328 Appendix F...
Page 334: ...P 661H HW Series User s Guide 334 Appendix G...
Page 368: ...P 661H HW Series User s Guide 368 Appendix K...
Page 376: ...P 661H HW Series User s Guide 376 Figure 219 Java Sun...