Authentication Types
Understanding Authentication Types
5
Cisco 3200 Series Wireless MIC Software Configuration Guide
EAP-TLS
EAP-Transport Layer Security (TLS) uses public key infrastructure (PKI) to acquire and validate digital
certificates. A digital certificate is a cryptographically signed structure that guarantees the association
between at least one identifier and a public key. It is valid for a limited time period and use, subject to
certificate policy conditions. The Certificate Authority (CA) issues certificates to client and server.
The supplicant and the back-end RADIUS server must both support EAP-TLS authentication. The root
device acts as an AAA client and is also known as the network access server (NAS). The root devices
must support 802.1x/EAP authentication process although they are not aware of the EAP authentication
protocol type. The NAS tunnels the authentication messages between the peer (user machine trying to
authenticate) and the AAA server (such as the Cisco ACS). The NAS is aware of the EAP authentication
process only when it starts and ends.
The following notes apply to EAP-TLS authentication:
•
The 2.4 GHz WMIC (C3201-WMIC) supports storage of one digital certificate in VRAM memory.
•
The EAP-TLS authentication mechanism requires that PKI infrastructure be in place with a
Certificate Authority (CA) server. You can use both Microsoft and OpenSSL CA servers to provide
the trustpoint.
•
EAP-TLS authentication takes place between the client device (workgroup bridge or non-root
bridge) and the AAA server. Only the root device must support EAP-based authentication.
•
The Cisco C3201 WMIC and the AAA server each obtains the CA certificate for its own key pairs.
See the
“Configuring Certificates Using the crypto pki CLI” section on page 7
for instructions on
configuring CA certificates.
EAP-FAST
Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) encrypts
EAP transactions within a TLS tunnel. The TLS tunnel encryption helps prevent dictionary attacks that
are possible using Light Extensible Authentication Protocol (LEAP). The EAP-FAST tunnel is
established using shared secret keys that are unique to users. Because handshakes based upon shared
secrets are intrinsically faster than handshakes based upon a PKI infrastructure, EAP-FAST is
significantly faster than Protected Extensible Authentication Protocol (PEAP) and EAP-TLS.
EAP-FAST operates in three phases:
•
Delivery of key to client
•
Establishment of a secure tunnel using the key
•
Authentication of the client over the secure tunnel
After successful client authentication to the EAP-FAST server, a RADIUS Access-accept message is
passed to the root device (along with the master session key) and an EAP success message is generated
at the root device (as with other EAP authentication protocols). Upon receipt of the EAP-success packet,
the client derives a session key using an algorithm that is complementary to that used at the server to
generate the session key passed to the root device.
EAP-TTLS
EAP-Tunneled TLS (TTLS) is an 802.1X authentication type supported by Funk Software. It uses TLS
(server certificates) and supports a variety of client authentication mechanisms, including legacy
mechanisms. EAP-TTLS supports both username/password and mutual authentication.
Содержание 3200 Series
Страница 14: ...xiv Cisco 3200 Series Wireless MIC Software Configuration Guide OL 6415 04 ...
Страница 120: ...Administering the WMIC Managing the System Time and Date 56 Cisco 3200 Series Wireless MIC Software Configuration Guide ...
Страница 136: ...Dynamic Frequency Selection Additional Information 6 Radio Channels and Transmit Frequencies OL 11491 03 ...
Страница 254: ...WIMIC Troubleshooting Error and Event Messages 12 Cisco 3200 Series Wireless MIC Software Configuration Guide ...
Страница 272: ...Supported MIBs Using FTP to Access the MIB Files 4 Cisco 3200 Series Wireless MIC Software Configuration Guide ...
Страница 314: ...Index IN 12 Cisco 3200 Series Wireless MIC Software Configuration Guide OL 6415 04 ...