Solved

eap-peap and eap-tls question

Posted on 2013-06-09
2
489 Views
Last Modified: 2013-12-09
Experts,

This should be an easy one.

I know with EAP-TLS, the supplicant sends a certificate to the authenticator server.

Am I correc to say that with EAP-PEAP, the supplicant sends a username and password to the authenticator server? It never sends a Certificate?
0
Comment
Question by:trojan81
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 24

Expert Comment

by:aadih
ID: 39233612
Look here for a detailed comparison:

http://www.opus1.com/www/whitepapers/ttlsandpeap.pdf >
0
 
LVL 21

Accepted Solution

by:
Jakob Digranes earned 350 total points
ID: 39234021
EAP-TLS is authentication with certificates

EAP-PEAP is just setting up a secure tunnel, and validation of radius server. Within that tunnel the client can pass authentication information.
So EAP type could be PEAP - and inner authentication method can still be EAP-TLS using certificates or MsChap V2 using domain username and password.

this would be the easy explanation .... really EAP is part of a framework. But for your question, this easy would do --- (Or else I'd have to look into my books to get it all correctly :-) )
0

Featured Post

Save the day with this special offer from ATEN!

Save 30% on the CV211 using promo code EXPERTS30 now through April 30th. The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article is a step by step guide on how to create a basic PTP link using Ubiquiti airOS devices. This guide can be used on the following Ubiquiti AirMAX devices. Nanostation, Bullets, AirBridge, Nanobeam, NanoBridge to name a few. Please review …
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question