+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
287
PEAP
(Protected Extensible Authentication Protocol)
They will be described in detail in the following part.
Attention:
The switch, as the access controlling unit of Pass-through, will not check the content of a
particular EAP method, so can support all the EAP methods above and all the EAP
authentication methods that may be extended in the future.
In EAP relay, if any authentication method in EAP-MD5, EAP-TLS, EAP-TTLS and PEAP is
adopted, the authentication methods of the supplicant system and the RADIUS server should
be the same.
1. EAP-MD5 Authentication Method
EAP-MD5 is an IETF open standard which providing the least security, since MD5 Hash
function is vulnerable to dictionary attacks.
The following figure illustrated the basic operation flow of the EAP-MD5 authentication method.
The Authentication Flow of 802.1x EAP-MD5
Содержание QSW-2800 series
Страница 189: ...7 495 797 3311 www qtech ru 18 1 175...
Страница 414: ...7 495 797 3311 www qtech ru 18 1 400...