Motorola MC3090G Integration Guide - Page 133

Wireless Applications, PEAP Tunneled, Authentication, Description, TTLS Tunneled

Page 133 highlights

Wireless Applications 6 - 11 2. Select the User Certificate check box if a certificate is required. The TLS tunnel type requires a user certificate, so the check box is automatically selected. 3. Tap Next. The Installed User Certs dialog box appears. Table 6-8 lists the PEAP tunneled authentication options. Table 6-8 PEAP Tunneled Authentication Options PEAP Tunneled Authentication Description MS CHAP v2 Microsoft Challenge Handshake Authentication Protocol version 2 (MS CHAP v2) is a password-based, challenge-response, mutual authentication protocol that uses the industry-standard Message Digest 4 (MD4) and Data Encryption Standard (DES) algorithms to encrypt responses. The authenticating server challenges the access client and the access client challenges the authenticating server. If either challenge is not correctly answered, the connection is rejected. MS CHAP v2 was originally designed by Microsoft as a PPP authentication protocol to provide better protection for dial-up and virtual private network (VPN) connections. With Windows XP SP1, Windows XP SP2, Windows Server 2003, and Windows 2000 SP4, MS CHAP v2 is also an EAP type. TLS EAP TLS is used during the phase 2 of the authentication process. This method uses a user certificate to authenticate. Table 6-9 lists the TTLS tunneled authentication options. Table 6-9 TTLS Tunneled Authentication Options TTLS Tunneled Authentication Description CHAP Challenge Handshake Authentication Protocol (CHAP) is one of the two main authentication protocols used to verify the user name and password for PPP Internet connections. CHAP is more secure than PAP because it performs a three way handshake during the initial link establishment between the home and remote machines. It can also repeat the authentication anytime after the link has been established. MS CHAP Microsoft Challenge Handshake Authentication Protocol (MS CHAP) is an implementation of the CHAP protocol that Microsoft created to authenticate remote Windows workstations. In most respects, MS CHAP is identical to CHAP, but there are a few differences. MS CHAP is based on the encryption and hashing algorithms used by Windows networks, and the MS CHAP response to a challenge is in a format optimized for compatibility with Windows operating systems.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236

Wireless Applications
6 - 11
2.
Select the
User Certificate
check box if a certificate is required. The TLS tunnel type requires a user certificate,
so the check box is automatically selected.
3.
Tap
Next
. The
Installed User Certs
dialog box appears.
Table 6-8
lists the PEAP tunneled authentication options.
Table 6-9
lists the TTLS tunneled authentication options.
Table 6-8
PEAP Tunneled Authentication Options
PEAP Tunneled
Authentication
Description
MS CHAP v2
Microsoft Challenge Handshake Authentication Protocol version 2 (MS CHAP v2) is a
password-based, challenge-response, mutual authentication protocol that uses the
industry-standard Message Digest 4 (MD4) and Data Encryption Standard (DES) algorithms to
encrypt responses. The authenticating server challenges the access client and the access client
challenges the authenticating server. If either challenge is not correctly answered, the
connection is rejected. MS CHAP v2 was originally designed by Microsoft as a PPP
authentication protocol to provide better protection for dial-up and virtual private network (VPN)
connections. With Windows XP SP1, Windows XP SP2, Windows Server 2003, and Windows
2000 SP4, MS CHAP v2 is also an EAP type.
TLS
EAP TLS is used during the phase 2 of the authentication process. This method uses a user
certificate to authenticate.
Table 6-9
TTLS Tunneled Authentication Options
TTLS Tunneled
Authentication
Description
CHAP
Challenge Handshake Authentication Protocol (CHAP) is one of the two main authentication
protocols used to verify the user name and password for PPP Internet connections. CHAP is
more secure than PAP because it performs a three way handshake during the initial link
establishment between the home and remote machines. It can also repeat the authentication
anytime after the link has been established.
MS CHAP
Microsoft Challenge Handshake Authentication Protocol (MS CHAP) is an implementation of the
CHAP protocol that Microsoft created to authenticate remote Windows workstations. In most
respects, MS CHAP is identical to CHAP, but there are a few differences. MS CHAP is based on
the encryption and hashing algorithms used by Windows networks, and the MS CHAP response
to a challenge is in a format optimized for compatibility with Windows operating systems.