Chapter 76 Port Authentication
XGS2220 Series User’s Guide
528
• Accounting-Response
Sent by the RADIUS server to indicate that it has started or stopped accounting.
The switch and the RADIUS server use a shared secret key, which is a password, they both know to
authenticate the communications between them, and ensure network security. A shared key is not sent
over the network.
The switch forwards the RADIUS requests of a client to the RADIUS server. The login password information
exchanged is sent over the network and encrypted to protect the network from unauthorized access.
76.6.3 EAP (Extensible Authentication Protocol) Authentication
This section discusses some popular authentication types: EAP-MD5, EAP-TLS, EAP-TTLS, PEAP and LEAP.
Your wired LAN device may not support all authentication types.
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE 802.1x
transport mechanism in order to support multiple types of user authentication. By using EAP to interact
with an EAP-compatible RADIUS server, a switch helps a wired station and a RADIUS server perform
authentication.
The type of authentication you use depends on the RADIUS server and an intermediary switch that
supports IEEE 802.1x.
For EAP-TLS authentication type, you must first have a wired connection to the network and obtain the
certificates from a certificate authority (CA). A certificate (also called digital IDs) can be used to
authenticate users and a CA issues certificates and guarantees the identity of each certificate owner.
• EAP-MD5 (Message-Digest Algorithm 5)
MD5 authentication is the simplest one-way authentication method. The authentication server sends a
challenge to the wired client. The wired client ‘proves’ that it knows the password by encrypting the
password with the challenge and sends back the information. Password is not sent in plain text.
However, MD5 authentication has some weaknesses. Since the authentication server needs to get the
plain text passwords, the passwords must be stored. Thus someone other than the authentication server
may access the password file. In addition, it is possible to impersonate an authentication server as MD5
authentication method does not perform mutual authentication. Finally, MD5 authentication method
does not support data encryption with dynamic session key. You must configure WEP encryption keys for
data encryption.
• EAP-TLS (Transport Layer Security)
With EAP-TLS, digital certifications are needed by both the server and the wired clients for mutual
authentication. The server presents a certificate to the client. After validating the identity of the server,
the client sends a different certificate to the server. The exchange of certificates is done in the open
before a secured tunnel is created. This makes user identity vulnerable to passive attacks. A digital
certificate is an electronic ID card that authenticates the sender’s identity. However, to implement
EAPTLS, you need a Certificate Authority (CA) to handle certificates, which imposes a management
overhead.
• EAP-TTLS (Tunneled Transport Layer Service)
Содержание XGS2220 Series
Страница 27: ...27 PART I User s Guide ...
Страница 56: ...56 PART II Technical Reference ...
Страница 154: ...Chapter 20 Cloud Management XGS2220 Series User s Guide 154 Figure 105 SYSTEM Cloud Management ...
Страница 309: ...Chapter 45 Multicast XGS2220 Series User s Guide 309 Figure 226 MVR Group Configuration Example View ...
Страница 467: ...Chapter 68 Policy Rule XGS2220 Series User s Guide 467 Figure 343 Policy Example ...
Страница 555: ...Chapter 78 MAINTENANCE XGS2220 Series User s Guide 555 Figure 413 MAINTENANCE Tech Support Download ...
Страница 562: ...Chapter 79 Networked AV Mode XGS2220 Series User s Guide 562 Figure 418 SYSTEM Cloud Management ...
Страница 616: ...616 PART III Troubleshooting and Appendices ...