Lantronix EMG 8500 EMG User Guide - Page 107

EAP TTLS Inner Authentication, EAP-MSCHAPv2, MSCHAPv2

Page 107 highlights

IEEE 802.1X Parameters, continued 7: Networking PEAP: Protected EAP uses server-side public key certificates to authenticate the EMG with a RADIUS server. PEAP authentication creates an encrypted TLS tunnel between the EMG and the server. The exchange of information is encrypted and stored in the tunnel ensuring the user credentials are kept secure. FAST: Flexible Authentication via Secure Tunneling uses Protected Access Credential (PAC) for verifying clients on the network. Instead of using a certificate to achieve mutual authentication, FAST authenticates by means of a PAC (Protected Access Credential) stored on the EMG, which can be managed dynamically by the authentication server. The PAC can be provisioned (distributed one time) to the client either manually or automatically. Manual provisioning is delivery to the client via disk or a secured network distribution method. Automatic provisioning (used on the EMG) is an in-band distribution. LEAP Configuration: Enter a User Name and Password that can be authenticated by the RADIUS server. The User Name and Password can be up to 63 characters long, and all printable characters are supported. EAP-TLS Configuration: Enter a User Name that can be authenticated by the RADIUS server. The User Name can be up to 63 characters long, and all printable characters are supported. Provide a client side certificate with a Certificate file, Private Key file and Authority Certificate file. The server side certificate can be validated by setting Validate Certificate to Enabled (requires an Authority Certificate); validating server the certificate is highly recommended. Certificate filenames must be unique across all profiles, otherwise certificates for one profile may be overwritten by certificates for another profile. If certificates are used, when saving and restoring configurations, it is recommended that the configuration be saved with SSL Certificates and the configuration be restored with the saved certificates. The Certificate Authority and Certificate are in PEM format (the Certificate Authority may have one or more trusted CA certificates), eg: -----BEGIN CERTIFICATE----(certificate in base64 encoding) -----END CERTIFICATE----- The Key File is in PEM format, eg: -----BEGIN RSA PRIVATE KEY----(private key in base64 encoding) -----END RSA PRIVATE KEY----- EAP-TTLS Configuration: Enter a User Name and Password that can be authenticated by the RADIUS server. The User Name and Password can be up to 63 characters long, and all printable characters are supported. Select the EAP TTLS Inner Authentication used in the TLS tunnel, which can be EAP-MSCHAPv2, MSCHAPv2, MSCHAP, CHAP, PAP or EAP-MD5. EMG™ Edge Management Gateway User Guide 107

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495

7: Networking
EMG™ Edge Management Gateway User Guide
107
IEEE 802.1X Parameters,
continued
PEAP:
Protected EAP uses server-side public key certificates to
authenticate the EMG with a RADIUS server. PEAP authentication
creates an encrypted TLS tunnel between the EMG and the server. The
exchange of information is encrypted and stored in the tunnel ensuring
the user credentials are kept secure.
FAST:
Flexible Authentication via Secure Tunneling uses Protected
Access Credential (PAC) for verifying clients on the network. Instead of
using a certificate to achieve mutual authentication, FAST
authenticates by means of a PAC (Protected Access Credential) stored
on the EMG, which can be managed dynamically by the authentication
server. The PAC can be provisioned (distributed one time) to the client
either manually or automatically. Manual provisioning is delivery to the
client via disk or a secured network distribution method. Automatic
provisioning (used on the EMG) is an in-band distribution.
LEAP Configuration:
Enter a
User Name
and
Password
that can be
authenticated by the RADIUS server. The User Name and Password
can be up to 63 characters long, and all printable characters are
supported.
EAP-TLS Configuration:
Enter a
User Name
that can be
authenticated by the RADIUS server. The User Name can be up to 63
characters long, and all printable characters are supported. Provide a
client side certificate with a
Certificate
file,
Private Key
file and
Authority Certificate
file. The server side certificate can be validated
by setting
Validate Certificate
to
Enabled
(requires an Authority
Certificate); validating server the certificate is highly recommended.
Certificate filenames must be unique across all profiles, otherwise
certificates for one profile may be overwritten by certificates for another
profile. If certificates are used, when saving and restoring
configurations, it is recommended that the configuration be saved with
SSL Certificates and the configuration be restored with the saved
certificates. The Certificate Authority and Certificate are in PEM format
(the Certificate Authority may have one or more trusted CA
certificates), eg:
-----BEGIN CERTIFICATE-----
(certificate in base64 encoding)
-----END CERTIFICATE-----
The Key File is in PEM format, eg:
-----BEGIN RSA PRIVATE KEY-----
(private key in base64 encoding)
-----END RSA PRIVATE KEY-----
EAP-TTLS Configuration:
Enter a
User Name
and
Password
that
can be authenticated by the RADIUS server. The User Name and
Password can be up to 63 characters long, and all printable characters
are supported. Select the
EAP TTLS Inner Authentication
used in the
TLS tunnel, which can be
EAP-MSCHAPv2, MSCHAPv2, MSCHAP,
CHAP, PAP
or
EAP-MD5
.