Solved

eap-peap and eap-tls question

Posted on 2013-06-09
2
465 Views
Last Modified: 2013-12-09
Experts,

This should be an easy one.

I know with EAP-TLS, the supplicant sends a certificate to the authenticator server.

Am I correc to say that with EAP-PEAP, the supplicant sends a username and password to the authenticator server? It never sends a Certificate?
0
Comment
Question by:trojan81
2 Comments
 
LVL 24

Expert Comment

by:aadih
ID: 39233612
Look here for a detailed comparison:

http://www.opus1.com/www/whitepapers/ttlsandpeap.pdf >
0
 
LVL 21

Accepted Solution

by:
Jakob Digranes earned 350 total points
ID: 39234021
EAP-TLS is authentication with certificates

EAP-PEAP is just setting up a secure tunnel, and validation of radius server. Within that tunnel the client can pass authentication information.
So EAP type could be PEAP - and inner authentication method can still be EAP-TLS using certificates or MsChap V2 using domain username and password.

this would be the easy explanation .... really EAP is part of a framework. But for your question, this easy would do --- (Or else I'd have to look into my books to get it all correctly :-) )
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
cableWifi customer support or tech support 8 55
How to boost WiFi? 7 45
WiFi range extension using apple timeCapsule and AirPort Extreme? 10 47
Cisco Air AP 6 42
Working settings for French ISP Orange "Prêt à Surfer" SIM cards for data connections only. Can't be found anywhere else !
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now