7: Networking
EMG™ Edge Management Gateway User Guide
106
IEEE 802.1X Parameters,
continued
PEAP:
Protected EAP uses server-side public key certificates to
authenticate the EMG with a RADIUS server. PEAP authentication
creates an encrypted TLS tunnel between the EMG and the server. The
exchange of information is encrypted and stored in the tunnel ensuring
the user credentials are kept secure.
FAST:
Flexible Authentication via Secure Tunneling uses Protected
Access Credential (PAC) for verifying clients on the network. Instead of
using a certificate to achieve mutual authentication, FAST
authenticates by means of a PAC (Protected Access Credential) stored
on the EMG, which can be managed dynamically by the authentication
server. The PAC can be provisioned (distributed one time) to the client
either manually or automatically. Manual provisioning is delivery to the
client via disk or a secured network distribution method. Automatic
provisioning (used on the EMG) is an in-band distribution.
LEAP Configuration:
Enter a
User Name
and
Password
that can be
authenticated by the RADIUS server. The User Name and Password
can be up to 63 characters long, and all printable characters are
supported.
EAP-TLS Configuration:
Enter a
User Name
that can be
authenticated by the RADIUS server. The User Name can be up to 63
characters long, and all printable characters are supported. Provide a
client side certificate with a
Certificate
file,
Private Key
file and
Authority Certificate
file. The server side certificate can be validated
by setting
Validate Certificate
to
Enabled
(requires an Authority
Certificate); validating server the certificate is highly recommended.
Certificate filenames must be unique across all profiles, otherwise
certificates for one profile may be overwritten by certificates for another
profile. If certificates are used, when saving and restoring
configurations, it is recommended that the configuration be saved with
SSL Certificates and the configuration be restored with the saved
certificates. The Certificate Authority and Certificate are in PEM format
(the Certificate Authority may have one or more trusted CA
certificates), eg:
-----BEGIN CERTIFICATE-----
(certificate in base64 encoding)
-----END CERTIFICATE-----
The Key File is in PEM format, eg:
-----BEGIN RSA PRIVATE KEY-----
(private key in base64 encoding)
-----END RSA PRIVATE KEY-----
EAP-TTLS Configuration:
Enter a
User Name
and
Password
that
can be authenticated by the RADIUS server. The User Name and
Password can be up to 63 characters long, and all printable characters
are supported. Select the
EAP TTLS Inner Authentication
used in the
TLS tunnel, which can be
EAP-MSCHAPv2, MSCHAPv2, MSCHAP,
CHAP, PAP
or
EAP-MD5
.
Содержание EMG 7500
Страница 1: ...Part Number PMD 00008 Revision C April 2020 EMG Edge Management Gateway User Guide EMG 8500 EMG 7500 ...
Страница 82: ...7 Networking EMG Edge Management Gateway User Guide 82 Figure 7 2 Network Network Settings 2 of 2 ...
Страница 100: ...7 Networking EMG Edge Management Gateway User Guide 100 Figure 7 5 Network Wireless Settings ...
Страница 353: ...15 Maintenance EMG Edge Management Gateway User Guide 353 Figure 15 12 About EMG ...
Страница 474: ...EMG Edge Management Gateway User Guide 474 Figure E 3 EU Declaration of Conformity ...
Страница 475: ...EMG Edge Management Gateway User Guide 475 Figure E 4 EU Declaration of Conformity continued ...