Solved

eap-peap and eap-tls question

Posted on 2013-06-09
2
471 Views
Last Modified: 2013-12-09
Experts,

This should be an easy one.

I know with EAP-TLS, the supplicant sends a certificate to the authenticator server.

Am I correc to say that with EAP-PEAP, the supplicant sends a username and password to the authenticator server? It never sends a Certificate?
0
Comment
Question by:trojan81
2 Comments
 
LVL 24

Expert Comment

by:aadih
ID: 39233612
Look here for a detailed comparison:

http://www.opus1.com/www/whitepapers/ttlsandpeap.pdf >
0
 
LVL 21

Accepted Solution

by:
Jakob Digranes earned 350 total points
ID: 39234021
EAP-TLS is authentication with certificates

EAP-PEAP is just setting up a secure tunnel, and validation of radius server. Within that tunnel the client can pass authentication information.
So EAP type could be PEAP - and inner authentication method can still be EAP-TLS using certificates or MsChap V2 using domain username and password.

this would be the easy explanation .... really EAP is part of a framework. But for your question, this easy would do --- (Or else I'd have to look into my books to get it all correctly :-) )
0

Featured Post

Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Coaxial cable bending There are several factors that govern the selection of coaxial cable for your Machine to Machine (M2M) application: the location of cable runs, either indoor or outdoor, inside or outside an enclosure, maximum bending and the…
In this article I will describe how to setup a Cisco WLC 5508 to work with Apple's Bonjour protocol across VLANs.  I will also discuss using screen mirroring and Airplay on an AppleTV v3.  This article covers the wireless network only and requires m…
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question