QTECH QSW-2800 Инструкция по настройке User Manual

Page 301

Advertising
background image

+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1

287

PEAP (Protected Extensible Authentication Protocol)

They will be described in detail in the following part.

Attention:

The switch, as the access controlling unit of Pass-through, will not check the content of a

particular EAP method, so can support all the EAP methods above and all the EAP

authentication methods that may be extended in the future.

In EAP relay, if any authentication method in EAP-MD5, EAP-TLS, EAP-TTLS and PEAP is

adopted, the authentication methods of the supplicant system and the RADIUS server should

be the same.

1. EAP-MD5 Authentication Method

EAP-MD5 is an IETF open standard which providing the least security, since MD5 Hash

function is vulnerable to dictionary attacks.

The following figure illustrated the basic operation flow of the EAP-MD5 authentication method.

The Authentication Flow of 802.1x EAP-MD5

Advertising