Authentication Protocol is a plain text password used on older SLIP systems. It is not secure. Only available for
TTLS
Authentication Type.
CHAP
Challenge Handshake Authentication Protocol is a three-way handshake protocol that is considered more secure
than Password Authentication Protocol. Only available for
TTLS
authentication Type.
MS-CHAP (MD4)
Uses a Microsoft version of RSA Message Digest 4 challenge-and-reply protocol. This only works on Microsoft
systems and enables data encryption. To select this authentication method causes all data to be encrypted. Only
available for
TTLS
authentication type.
MS-CHAP-V2
Introduces an additional feature not available with MS-CHAP-V1 or standard CHAP authentication, the change
password feature. This feature allows the client to change the account password if the RADIUS server reports that
the password has expired. Available for
TTLS
and
PEAP
authentication types.
Generic Token Card (GTC)
Carries user-specific token cards for authentication. The main feature in GTC is Digital Certificate/Token Card-
based authentication. In addition, GTC includes the ability to hide user name identities until the TLS encrypted
tunnel is established, which provides additional confidentiality that user names are not being broadcast during the
authentication phase. Only available for
PEAP
authentication type.
TLS
The TLS protocol is intended to secure and authenticate communications across a public network through data
encryption. The TLS Handshake Protocol allows the server and client to provide mutual authentication and to
negotiate an encryption algorithm and cryptographic keys before data is transmitted. Only available for
PEAP
authentication type.
Cisco Features
Cisco LEAP
Cisco LEAP (Cisco Light EAP) is a server and client 802.1X authentication through a user-supplied logon password.
When a wireless access point communicates with a Cisco LEAP-enabled RADIUS (Cisco Secure Access Control
Server [ACS]), Cisco LEAP provides access control through mutual authentication between client WiFi adapters and
the wireless networks and provides dynamic, individual user encryption keys to help protect the privacy of
transmitted data.
Cisco Rogue Access Point Security Feature
The Cisco Rogue access point feature provides security protection from an introduction of a rogue access point that
could mimic a legitimate access point on a network in order to extract information about user credentials and
authentication protocols that could compromise security. This feature only works with Cisco's LEAP authentication.
Standard 802.11 technology does not protect a network from the introduction of a rogue access point. See
LEAP
Authentication
for more information.
802.11b and 802.11g Mixed Environment Protection Protocol
Some access points, for example Cisco 350 or Cisco 1200, support environments in which not all client stations
support WEP encryption; this is called Mixed-Cell Mode. When these wireless networks operate in "optional
encryption" mode, client stations that join in WEP mode, send all messages encrypted, and stations that use
standard mode send all messages unencrypted. These access points broadcast that the network does not use
Intel® PROSet/Wireless WiFi Connection Utility User's Guide
Содержание 512AN_HMW
Страница 59: ...Back to Contents Trademarks and Disclaimers Intel PROSet Wireless WiFi Connection Utility User s Guide ...
Страница 105: ...Back to Top Back to Contents Trademarks and Disclaimers Intel PROSet Wireless WiFi Connection Utility User s Guide ...
Страница 136: ...Back to Top Back to Contents Trademarks and Disclaimers Intel PROSet Wireless WiFi Connection Utility User s Guide ...