ZyAIR B-5000 User’s Guide
Types of EAP Authentication E-1
Appendix E
Types of EAP Authentication
This appendix discusses two popular EAP authentication types:
EAP-MD5
and
EAP-TLS
. The type of
authentication you use depends on the RADIUS server. Consult your network administrator for more
information.
EAP-MD5 (Message-Digest Algorithm 5)
MD5 authentication is the simplest one-way authentication method. The authentication server sends a
challenge to the wireless station. The wireless station ‘proves’ that it knows the password by encrypting the
password with the challenge and sends back the information. Password is not sent in plain text.
However, MD5 authentication has some weaknesses. Since the authentication server needs to get the
plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may
access the password file. In addition, it is possible to impersonate an authentication server, as MD5
authentication method does not perform mutual authentication. Finally, MD5 authentication method does
not support data encryption with dynamic session key. You must configure WEP encryption keys for data
encryption.
EAP-TLS (Transport Layer Security)
With EAP-TLS, digital certifications are needed by both the server and the wireless stations for mutual
authentication. The server presents a certificate to the client. After validating the identity of the server, the
client sends a different certificate to the server. The exchange of certificates is done in the open before a
secured tunnel is created. This makes user identity vulnerable to passive attacks. A digital certificate is an
electronic ID card that authenticates the sender’s identity. However, to implement EAP-TLS, you need a
Certificate Authority (CA) to handle certificates, which imposes a management overhead.
For added security, certificate-based authentications such as EAP-TLS use dynamic keys for data
encryption. They are often deployed in corporate environments, but for public deployment, simple user
name and password pair is more practical. The following table is a comparison of the features of two
authentication types used in the ZyAIR.
Summary of Contents for ZyAIR B-5000
Page 1: ...ZyAIR B 5000 Outdoor Access Point Bridge User s Guide Version 1 5 8 200 February 2004 ...
Page 6: ...ZyAIR B 5000 User s Guide vi ...
Page 12: ...ZyAIR B 5000 User s Guide xii Table of Contents ...
Page 20: ...ZyAIR B 5000 User s Guide xx Preface ...
Page 22: ......
Page 26: ......
Page 32: ......
Page 36: ......
Page 52: ...ZyAIR B 5000 User s Guide 4 16 Access Point Quick Setup Figure 4 8 Quick Setup Wireless ...
Page 78: ......
Page 80: ...ZyAIR B 5000 User s Guide 6 2 System Setup Figure 6 1 Basic Configuration Tutorial ...
Page 92: ......
Page 96: ......
Page 102: ......
Page 114: ......
Page 124: ......
Page 128: ......
Page 130: ......
Page 152: ......
Page 172: ......
Page 174: ......
Page 182: ......
Page 184: ......
Page 214: ......
Page 226: ......
Page 228: ......
Page 242: ......
Page 252: ......
Page 272: ......
Page 282: ......
Page 284: ......