Motorola MC55 Enterprise Guía de usuario Pagina 30

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 84
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 29
4 - 6 Wireless Fusion Enterprise Mobility Suite User Guide
Table 4-6 lists the EAP-FAST tunneled authentication options.
User Certificate Selection
If the user checked the User Certificate check box on the Tunneled Authentication dialog box or if TLS is the
selected authentication type, the
Installed User Certificates dialog box displays. Select a certificate from the
drop-down list of currently installed certificates before proceeding. The selected certificate’s name appears in the
drop-down list. If the required certificate is not in the list, install it.
PAP Password Authentication Protocol (PAP) has two variations: PAP and CHAP PAP. It
verifies a user name and password for PPP Internet connections, but it is not as secure
as CHAP, since it works only to establish the initial link. PAP is also more vulnerable to
attack because it sends authentication packets throughout the network. Nevertheless,
PAP is more commonly used than CHAP to log in to a remote host like an Internet service
provider.
MD5 Message Digest-5 (MD5) is an authentication algorithm developed by RSA. MD5
generates a 128-bit message digest using a 128-bit key, IPSec truncates the message
digest to 96 bits.
Table 4-6
EAP-FAST Tunneled Authentication Options
EAP-FAST Tunneled
Authentication
Description
MS CHAP v2 Microsoft Challenge Handshake Authentication Protocol version 2 (MS CHAP v2) is a
password-based, challenge-response, mutual authentication protocol that uses the
industry-standard Message Digest 4 (MD4) and Data Encryption Standard (DES)
algorithms to encrypt responses. The authenticating server challenges the access
client and the access client challenges the authenticating server. If either challenge is
not correctly answered, the connection is rejected. MS CHAP v2 was originally
designed by Microsoft as a PPP authentication protocol to provide better protection for
dial-up and virtual private network (VPN) connections. With Windows XP SP1,
Windows XP SP2, Windows Server 2003, and Windows 2000 SP4, MS CHAP v2 is
also an EAP type.
TLS EAP TLS is used during phase 2 of the authentication process. This method uses a
user certificate to authenticate.
EAP-GTC EAP-GTC is used during phase 2 of the authentication process. This method uses a
time-synchronized hardware or software token generator, often in conjunction with a
user PIN, to create a temporary password that expires after a short period of time.
Table 4-5
TTLS Tunneled Authentication Options (Continued)
TTLS Tunneled
Authentication
Description
Vista de pagina 29
1 2 ... 25 26 27 28 29 30 31 32 33 34 35 ... 83 84

Comentarios a estos manuales

Sin comentarios