Solved

eap-peap and eap-tls question

Posted on 2013-06-09
2
498 Views
Last Modified: 2013-12-09
Experts,

This should be an easy one.

I know with EAP-TLS, the supplicant sends a certificate to the authenticator server.

Am I correc to say that with EAP-PEAP, the supplicant sends a username and password to the authenticator server? It never sends a Certificate?
0
Comment
Question by:trojan81
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 24

Expert Comment

by:aadih
ID: 39233612
Look here for a detailed comparison:

http://www.opus1.com/www/whitepapers/ttlsandpeap.pdf >
0
 
LVL 22

Accepted Solution

by:
Jakob Digranes earned 350 total points
ID: 39234021
EAP-TLS is authentication with certificates

EAP-PEAP is just setting up a secure tunnel, and validation of radius server. Within that tunnel the client can pass authentication information.
So EAP type could be PEAP - and inner authentication method can still be EAP-TLS using certificates or MsChap V2 using domain username and password.

this would be the easy explanation .... really EAP is part of a framework. But for your question, this easy would do --- (Or else I'd have to look into my books to get it all correctly :-) )
0

Featured Post

Get HTML5 Certified

Want to be a web developer? You'll need to know HTML. Prepare for HTML5 certification by enrolling in July's Course of the Month! It's free for Premium Members, Team Accounts, and Qualified Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question