Copyright Goodheart-Willcox Co., Inc. 450 Security Essentials A RADIUS Federation is a method where users can connect and authenticate to one network while using credentials from another network. The term federation refers to different computing entities adhering to standards in a collective manner. A user’s credentials will be packaged by the local RADIUS server, which will then send it to the specified RADIUS server. The RADIUS servers work together to pass these credentials between the different systems. PEAP Protected EAP (PEAP) is an open-standard authentication protocol created jointly by Cisco, Microsoft, and RSA to protect EAP communications. PEAP uses a light- weight tunneling protocol to enable secure authentication. EAP-FAST EAP-Flexible Authentication via Secure Tunneling (FAST) is an authentication protocol created by Cisco to replace a previously unsecure version of EAP called Lightweight EAP (LEAP). EAP-FAST uses a lightweight tunneling protocol to enable authentication. EAP-TLS EAP over Transport Layer Security (EAP-TLS) is a protocol that provides certifi- cate-based authentication. TLS is the security protocol used when connecting to a web server securely and is commonly used in wireless authentication. It offers strong security and is widely supported. EAP-TTLS EAP Tunnel Transport Layer Security (EAP-TTLS) is an extension of EAP-TLS that allows communication to be sent through a protected tunnel. EAP-TTLS helps reduce attacks such as man-in-the-middle attacks. Wi-Fi Protected Access III (WPA3) Wi-Fi Protected Access III (WPA3) is the newest generation of Wi-Fi security and provides advanced security protocols to the communication of wireless transmis- sions. It was designed to use the latest security methods, disallow the use of outdated 3.4 3.4 3.4 3.4 3.4 2. EAP response-identity packet sent 1. EAP request-identity packet sent Authenticating RADIUS Server Authenticator (Access Point) Supplicant (Client) 2. EAP response- identity packet sent 3. Challenge is sent 5. Challenge response is sent 3. Supplicant provides identity to authenticator 4. Challenge is repackaged Goodheart-Willcox Publisher (tablet) romvo/Shutterstock.com (router) RealVector/Shutterstock.com (server) Sujith RS/Shutterstock.com Figure 14-2 With the 802.1X standard, Extensible Authentication Protocol (EAP) is incorporated into data frames and used to provide this authentication.
Previous Page Next Page