2 eap termination mode – QTECH QSW-3400 Инструкция по настройке User Manual

Page 329

Advertising
background image

+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1

328

safely encrypted tunnel established via the certificate of the authentication server. Any kind of

authentication request including EAP, PAP and MS-CHAPV2 can be transmitted within TTLS

tunnels.

4. PEAP Authentication Method

EAP-PEAP is brought up by Cisco, Microsoft and RAS Security as a recommended open

standard. It has long been utilized in products and provides very good security. Its design of

protocol and security is similar to that of EAP-

TTLS, using a server’s PKI certificate to

establish a safe TLS tunnel in order to protect user authentication.

The following figure illustrates the basic operation flow of PEAP authentication method.

the Authentication Flow of 802.1x PEAP

40.1.5.2 EAP Termination Mode

In this mode, EAP messages will be terminated in the access control unit and mapped into

RADIUS messages, which is used to implement the authentication, authorization and fee-

counting. The basic operation flow is illustrated in the next figure.

In EAP termination mode, the access control unit and the RADIUS server can use PAP or

CHAP authentication method. The following figure will demonstrate the basic operation flow

Advertising