HP 4200n HP Jetdirect Print Servers - Administrator Guide - Page 259

EAP/802.1x., EAP-MD5, EAP-TLS, EAP/PSK., as a RADIUS Remote Authentication Dial In User Service, RFC

Page 259 highlights

EAP/802.1x. IEEE 802.1x EAP (Extensible Authentication Protocol) is used on networks that use authentication servers, such as a RADIUS (Remote Authentication Dial In User Service, RFC 2138) server, for client authentication on a network. HP Jetdirect 802.11b wireless print servers support popular authentication methods based on EAP, including: G LEAP (Lightweight Extensible Authentication Protocol). LEAP is a Cisco Systems, Inc. proprietary protocol. LEAP requires an EAP User Name and EAP Password. Dynamic encryption keys are also used. G PEAP (Protected Extensible Authentication Protocol). PEAP uses digital certificates for network server authentication and passwords for client authentication. PEAP requires an EAP User Name, EAP Password, and CA Certificate. Dynamic encryption keys are also used. G EAP-MD5 (EAP using Message Digest Algorithm 5, RFC 1321). EAP-MD5 uses a password protected by the MD5 encryption algorithm. For MD5, enter an EAP User Name and EAP Password. Static encryption keys are also used. G EAP-TLS (EAP using Transport Layer Security, RFC 2716). EAP-TLS uses X.509-compliant digital certificates for both client and network server authentication. TLS requires an EAP User Name, Jetdirect Certificate, and CA Certificate. Dynamic encryption keys are also used. G EAP-TTLS (EAP using Tunneled Transport Layer Security). EAP-TTLS is an EAP-TLS extension that also uses X.509-compliant digital certificates. TTLS requires an EAP User Name, EAP Password and CA Certificate. Dynamic encryption keys are also used. As indicated for each EAP/802.1x authentication method, configuration of additional parameters may be necessary. EAP/PSK. For small office networks that do not have an authentication server, HP Jetdirect wireless print servers support network authentication using Extensible Authentication Protocol with a Pre-shared key (EAP/PSK). Using a pass-phrase entered by the user, the print server generates a pre-shared key used for network access and communications. When configured for EAP/PSK authentication, the print server uses Wi-Fi Protected Access (WPA) dynamic encryption protocols for wireless communications. ENWW HP Jetdirect 802.11b Wireless Print Servers 259

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302

ENWW
HP Jetdirect 802.11b Wireless Print Servers 259
EAP/802.1x.
IEEE 802.1x EAP (Extensible Authentication
Protocol) is used on networks that use authentication servers, such
as a RADIUS (Remote Authentication Dial In User Service, RFC
2138) server, for client authentication on a network. HP Jetdirect
802.11b wireless print servers support popular authentication
methods based on EAP, including:
LEAP
(Lightweight Extensible Authentication Protocol). LEAP
is a Cisco Systems, Inc. proprietary protocol. LEAP requires an
EAP User Name and EAP Password. Dynamic encryption keys
are also used.
PEAP
(Protected Extensible Authentication Protocol). PEAP
uses digital certificates for network server authentication and
passwords for client authentication. PEAP requires an EAP
User Name, EAP Password, and CA Certificate. Dynamic
encryption keys are also used.
EAP-MD5
(EAP using Message Digest Algorithm 5, RFC 1321).
EAP-MD5 uses a password protected by the MD5 encryption
algorithm. For MD5, enter an EAP User Name and EAP
Password. Static encryption keys are also used.
EAP-TLS
(EAP using Transport Layer Security, RFC 2716).
EAP-TLS uses X.509-compliant digital certificates for both
client and network server authentication. TLS requires an EAP
User Name, Jetdirect Certificate, and CA Certificate. Dynamic
encryption keys are also used.
EAP-TTLS
(EAP using Tunneled Transport Layer Security).
EAP-TTLS is an EAP-TLS extension that also uses
X.509-compliant digital certificates. TTLS requires an EAP
User Name, EAP Password and CA Certificate. Dynamic
encryption keys are also used.
As indicated for each EAP/802.1x authentication method,
configuration of additional parameters may be necessary.
EAP/PSK.
For small office networks that do not have an
authentication server, HP Jetdirect wireless print servers support
network authentication using Extensible Authentication Protocol
with a Pre-shared key (EAP/PSK). Using a pass-phrase entered by
the user, the print server generates a pre-shared key used for
network access and communications.
When configured for EAP/PSK authentication, the print server uses
Wi-Fi Protected Access (WPA) dynamic encryption protocols for
wireless communications.