Lantronix EMG 8500 EMG User Guide - Page 106

IEEE 802.1X EAP Protocol, IEEE 802.1X Parameters

Page 106 highlights

WPA/WPA2 Security Parameters IEEE 802.1X Parameters 7: Networking If WPA2/WPA Mixed Mode security suite is selected, these authentication parameters can be selected and configured: Authentication: Select PSK for a connection where the same key must be configured on both on the EMG side and on the access point side, or IEEE 802.1X for a connection that is authenticated with a RADIUS server that is part of the network. The RADIUS server matches the credentials sent by the EMG with an internal database. If IEEE 802.1X is selected under authentication type, see the IEEE 802.1X Parameters below for configuring WPA2 enterprise authentication. Key Type: For WPA/WPA2 PSK authentication, select the type of key required for the WLAN network: Passphrase for an ASCII password, or Hex for a 64 character hexadecimal key. Passphrase / Retype Passphrase: For WPA/WPA2 PSK authentication with Passphrase, enter the passphrase required to authenticate the connection. The minimum length of passphrase is 8 characters and the maximum length is 63 characters. All printable characters may be used in the passphrase. Key: For WPA/WPA2 PSK authentication with Hex keys, enter the hexadecimal key. The key should be exactly 64 hexadecimal characters. The Show Keys checkbox can be used to display the masked key. Encryption: For WPA/WPA2 PSK authentication, select the type of encryption - CCMP (preferred), TKIP or Any. 802.1X uses enterprise class authentication to grant access to secure networks. There are 3 components to 802.1X:  A supplicant, or client, which requires authentication (the EMG).  An authenticator, or access point, which acts as a proxy for the client, and restricts the client's communication with the authentication server.  An authentication server (usually RADIUS), which decides whether to accept the client's request for network access. If IEEE 802.1X is selected for Authentication, these parameters can be selected and configured: IEEE 802.1X EAP Protocol: Select one of the following Extensible Authentication Protocol (EAP) protocols to use for authentication with the RADIUS server. With EAP, the keys used for authentication are negotiated and changed automatically, offering a greater level of security over PSK authentication where the keys are stored on the device on each side of a connection. LEAP: Lightweight Extensible Authentication Protocol (LEAP) uses dynamic WEP keys and mutual authentication with a modified version of MS-CHAP between the EMG and a RADIUS server. EAP-TLS: uses TLS and Public key Infrastructure (PKI) to set up authentication with a RADIUS server. This method requires the use of a client-side certificate for communicating with the server. EAP-TTLS: uses TTLS (Tunneled Transport Layer Security) and server-side certificates to set up authentication between the EMG and a RADIUS server. The actual authentication is, however, performed using passwords. EMG™ Edge Management Gateway User Guide 106

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495

7: Networking
EMG™ Edge Management Gateway User Guide
106
WPA/WPA2 Security
Parameters
If WPA2/WPA Mixed Mode security suite is selected, these
authentication parameters can be selected and configured:
Authentication:
Select
PSK
for a connection where the same key
must be configured on both on the EMG side and on the access point
side, or
IEEE 802.1X
for a connection that is authenticated with a
RADIUS server that is part of the network. The RADIUS server
matches the credentials sent by the EMG with an internal database. If
IEEE 802.1X is selected under authentication type, see the IEEE
802.1X Parameters below for configuring WPA2 enterprise
authentication.
Key Type:
For WPA/WPA2 PSK authentication, select the type of key
required for the WLAN network: Passphrase for an ASCII password, or
Hex for a 64 character hexadecimal key.
Passphrase / Retype Passphrase:
For WPA/WPA2 PSK
authentication with Passphrase, enter the passphrase required to
authenticate the connection. The minimum length of passphrase is 8
characters and the maximum length is 63 characters. All printable
characters may be used in the passphrase.
Key:
For WPA/WPA2 PSK authentication with Hex keys, enter the
hexadecimal key. The key should be exactly 64 hexadecimal
characters. The Show Keys checkbox can be used to display the
masked key.
Encryption:
For WPA/WPA2 PSK authentication, select the type of
encryption - CCMP (preferred), TKIP or Any.
IEEE 802.1X Parameters
802.1X uses enterprise class authentication to grant access to secure
networks. There are 3 components to 802.1X:
A supplicant, or client, which requires authentication (the EMG).
An authenticator, or access point, which acts as a proxy for the
client, and restricts the client's communication with the
authentication server.
An authentication server (usually RADIUS), which decides whether
to accept the client's request for network access.
If
IEEE 802.1X
is selected for Authentication, these parameters can be
selected and configured:
IEEE 802.1X EAP Protocol:
Select one of the following Extensible
Authentication Protocol (EAP) protocols to use for authentication with
the RADIUS server. With EAP, the keys used for authentication are
negotiated and changed automatically, offering a greater level of
security over PSK authentication where the keys are stored on the
device on each side of a connection.
LEAP:
Lightweight Extensible Authentication Protocol (LEAP) uses
dynamic WEP keys and mutual authentication with a modified version
of MS-CHAP between the EMG and a RADIUS server.
EAP-TLS:
uses TLS and Public key Infrastructure (PKI) to set up
authentication with a RADIUS server. This method requires the use of a
client-side certificate for communicating with the server.
EAP-TTLS:
uses TTLS (Tunneled Transport Layer Security) and
server-side certificates to set up authentication between the EMG and
a RADIUS server. The actual authentication is, however, performed
using passwords.