Lantronix EMG 8500 EMG User Guide - Page 98

EAP-TLS, Lightweight Extensible Authentication Protocol LEAP uses dynamic WEP keys

Page 98 highlights

7: Networking The wireless client can connect to a WLAN network using WEP authentication (Open or Shared with 64 bit or 128 bit encryption), or WPA/WPA2 authentication (PSK or 802.1X/Enterprise with AES/CCMP or TKIP encryption). 802.1X is an enterprise class access protocol for protecting networks via authentication. There are three components to 802.1X authentication:  A supplicant, or client, which requires authentication (the EMG).  An authenticator, or access point, which acts as a proxy for the client, and restricts the client's communication with the authentication server.  An authentication server (usually RADIUS), which decides whether to accept the client's request for network access. Extensible Authentication Protocol (EAP) is used to pass the authentication information between the supplicant (the EMG) and the authentication server. The EAP type handles and defines the authentication. The access point acting as authenticator is only a proxy to allow the supplicant and the authentication server to communicate. The EMG supports the following EAP protocols:  LEAP: Lightweight Extensible Authentication Protocol (LEAP) uses dynamic WEP keys and mutual authentication with a modified version of MS-CHAP between the EMG and a RADIUS server.  EAP-TLS: uses TLS and Public key Infrastructure (PKI) to set up authentication with a RADIUS server. This method requires the use of a client-side certificate for communicating with the server.  EAP-TTLS: uses TTLS (Tunneled Transport Layer Security) and server-side certificates to set up authentication between the EMG and a RADIUS server. The actual authentication is, however, performed using passwords.  PEAP: Protected EAP uses server-side public key certificates to authenticate the EMG with a RADIUS server. PEAP authentication creates an encrypted TLS tunnel between the EMG and the server. The exchange of information is encrypted and stored in the tunnel ensuring the user credentials are kept secure.  FAST: Flexible Authentication via Secure Tunneling uses Protected Access Credential (PAC) for verifying clients on the network. Instead of using a certificate to achieve mutual authentication, FAST authenticates by means of a PAC (Protected Access Credential) stored on the EMG, which can be managed dynamically by the authentication server. The PAC can be provisioned (distributed one time) to the client either manually or automatically. Manual provisioning is delivery to the client via disk or a secured network distribution method. Automatic provisioning (used on the EMG) is an in-band distribution. This table summarizes the features of each EAP protocol: EAP Protocol TLS Feature Client-side yes certificate required Server-side yes certificate required WEP key yes management TTLS no yes yes PEAP no yes yes FAST no (PAC) LEAP no no (PAC) no yes yes EMG™ Edge Management Gateway User Guide 98

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495

7: Networking
EMG™ Edge Management Gateway User Guide
98
The wireless client can connect to a WLAN network using WEP authentication (Open or Shared
with 64 bit or 128 bit encryption), or WPA/WPA2 authentication (PSK or 802.1X/Enterprise with
AES/CCMP or TKIP encryption).
802.1X is an enterprise class access protocol for protecting networks via authentication. There are
three components to 802.1X authentication:
A supplicant, or client, which requires authentication (the EMG).
An authenticator, or access point, which acts as a proxy for the client, and restricts the client's
communication with the authentication server.
An authentication server (usually RADIUS), which decides whether to accept the client's
request for network access.
Extensible Authentication Protocol (EAP) is used to pass the authentication information between
the supplicant (the EMG) and the authentication server. The EAP type handles and defines the
authentication. The access point acting as authenticator is only a proxy to allow the supplicant and
the authentication server to communicate. The EMG supports the following EAP protocols:
LEAP
: Lightweight Extensible Authentication Protocol (LEAP) uses dynamic WEP keys and
mutual authentication with a modified version of MS-CHAP between the EMG and a RADIUS
server.
EAP-TLS:
uses TLS and Public key Infrastructure (PKI) to set up authentication with a
RADIUS server. This method requires the use of a client-side certificate for communicating
with the server.
EAP-TTLS:
uses TTLS (Tunneled Transport Layer Security) and server-side certificates to set
up authentication between the EMG and a RADIUS server. The actual authentication is,
however, performed using passwords.
PEAP:
Protected EAP uses server-side public key certificates to authenticate the EMG with a
RADIUS server. PEAP authentication creates an encrypted TLS tunnel between the EMG and
the server. The exchange of information is encrypted and stored in the tunnel ensuring the
user credentials are kept secure.
FAST:
Flexible Authentication via Secure Tunneling uses Protected Access Credential (PAC)
for verifying clients on the network. Instead of using a certificate to achieve mutual
authentication, FAST authenticates by means of a PAC (Protected Access Credential) stored
on the EMG, which can be managed dynamically by the authentication server. The PAC can
be provisioned (distributed one time) to the client either manually or automatically. Manual
provisioning is delivery to the client via disk or a secured network distribution method.
Automatic provisioning (used on the EMG) is an in-band distribution.
This table summarizes the features of each EAP protocol:
EAP Protocol
Feature
TLS
TTLS
PEAP
FAST
LEAP
Client-side
certificate
required
yes
no
no
no (PAC)
no
Server-side
certificate
required
yes
yes
yes
no (PAC)
no
WEP key
management
yes
yes
yes
yes
yes