
Appendix C Wireless LANs
User’s Guide
319
However, MD5 authentication has some weaknesses. Since the authentication
server needs to get the plaintext passwords, the passwords must be stored. Thus
someone other than the authentication server may access the password file. In
addition, it is possible to impersonate an authentication server as MD5
authentication method does not perform mutual authentication. Finally, MD5
authentication method does not support data encryption with dynamic session
key. You must configure WEP encryption keys for data encryption.
EAP-TLS (Transport Layer Security)
With EAP-TLS, digital certifications are needed by both the server and the wireless
clients for mutual authentication. The server presents a certificate to the client.
After validating the identity of the server, the client sends a different certificate to
the server. The exchange of certificates is done in the open before a secured
tunnel is created. This makes user identity vulnerable to passive attacks. A digital
certificate is an electronic ID card that authenticates the sender’s identity.
However, to implement EAP-TLS, you need a Certificate Authority (CA) to handle
certificates, which imposes a management overhead.
EAP-TTLS (Tunneled Transport Layer Service)
EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for
only the server-side authentications to establish a secure connection. Client
authentication is then done by sending username and password through the
secure connection, thus client identity is protected. For client authentication, EAP-
TTLS supports EAP methods and legacy authentication methods such as PAP,
CHAP, MS-CHAP and MS-CHAP v2.
PEAP (Protected EAP)
Like EAP-TTLS, server-side certificate authentication is used to establish a secure
connection, then use simple username and password methods through the
secured connection to authenticate the clients, thus hiding client identity.
However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2
and EAP-GTC (EAP-Generic Token Card), for client authentication. EAP-GTC is
implemented only by Cisco.
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of
IEEE 802.1x.
Содержание MAX-306
Страница 2: ......
Страница 8: ...Safety Warnings User s Guide 8...
Страница 10: ...Contents Overview User s Guide 10...
Страница 30: ...30...
Страница 36: ...Chapter 1 Getting Started User s Guide 36...
Страница 46: ...Chapter 2 Introducing the Web Configurator User s Guide 46...
Страница 64: ...Chapter 4 VoIP Connection Wizard User s Guide 64...
Страница 65: ...65 PART II Basic Screens The Main Screen 40 The Setup Screens 67...
Страница 66: ...66...
Страница 74: ...74...
Страница 88: ...Chapter 6 The LAN Configuration Screens User s Guide 88...
Страница 112: ...Chapter 8 The Wi Fi Configuration Screens User s Guide 112...
Страница 134: ...Chapter 10 The NAT Configuration Screens User s Guide 134...
Страница 145: ...145 PART IV Voice Screens The Service Configuration Screens 147 The Phone Screens 165 The Phone Book Screens 175...
Страница 146: ...146...
Страница 164: ...Chapter 12 The Service Configuration Screens User s Guide 164...
Страница 180: ...Chapter 14 The Phone Book Screens User s Guide 180...
Страница 182: ...182...
Страница 202: ...Chapter 15 The Certificates Screens User s Guide 202...
Страница 212: ...Chapter 16 The Firewall Screens User s Guide 212...
Страница 226: ...Chapter 18 The Remote Management Screens User s Guide 226...
Страница 242: ...Chapter 19 The Logs Screens User s Guide 242...
Страница 252: ...Chapter 20 The UPnP Screen User s Guide 252...
Страница 265: ...265 PART VI Troubleshooting and Specifications Troubleshooting 267 Product Specifications 275...
Страница 266: ...266...
Страница 274: ...Chapter 22 Troubleshooting User s Guide 274...
Страница 278: ...278...
Страница 310: ...Appendix B Setting Up Your Computer s IP Address User s Guide 310...
Страница 336: ...Appendix D Pop up Windows JavaScripts and Java Permissions User s Guide 336...
Страница 380: ...Appendix F Importing Certificates User s Guide 380...
Страница 382: ...Appendix G SIP Passthrough User s Guide 382...
Страница 398: ...Appendix J Customer Support User s Guide 398...
Страница 405: ...Index User s Guide 405...