ZyAIR G-1000 Access Point User’s Guide
E-2
Types of EAP Authentication
hiding client identity. However, PEAP only supports EAP methods, such as EAP-MD5 and EAP-
MSCHAPv2, for client authentication.
For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys
for data encryption. They are often deployed in corporate environments, but for public deployment, simple
user name and password pair is more practical. The following table is a comparison of the features of four
authentication types.
Comparison of EAP Authentication Types
EAP-MD5
EAP-TLS
EAP-TTLS
PEAP
Mutual
Authentication
No Yes Yes Yes
Certificate – Client
No Yes
Optional
Optional
Certificate – Server
No Yes Yes Yes
Dynamic Key
Exchange
No Yes Yes Yes
Credential Security
None Strong Strong Strong
Deployment
Difficulty
Easy Hard
Moderate
Moderate
Wireless Security
Poor Best Good Good
Client Identity
Protection
No No Yes Yes
Summary of Contents for ZYAIR G-1000
Page 1: ...ZyAIR G 1000 Wireless 54 Mbps Access Point User s Guide Version 3 50 July 2003...
Page 6: ......
Page 20: ......
Page 32: ......
Page 34: ......
Page 40: ......
Page 64: ......
Page 66: ......
Page 70: ......
Page 76: ......
Page 77: ...Maintenance IV Part IV MAINTENANCE This part describes the Maintenance screens...
Page 78: ......
Page 90: ......
Page 92: ......
Page 95: ...ZyAIR G 1000 Access Point User s Guide Introducing the SMT 10 3 Figure 10 3 SMT Menu Overview...
Page 98: ......
Page 120: ......
Page 140: ......
Page 144: ......
Page 146: ......
Page 150: ......
Page 162: ......
Page 182: ......
Page 186: ......
Page 192: ......