Appendix B Authentication in ACS 5.3

PEAPv0/1

PEAP Flow in ACS 5.3

The PEAP protocol allows authentication between ACS and the peer by using the PKI-based secure tunnel establishment and the EAP-MSCHAPv2 protocol as the inner method inside the tunnel. The local certificate can be validated by the peer (server-authenticated mode) or not validated (server-unauthenticated mode).

This section contains:

Creating the TLS Tunnel, page B-17

Authenticating with MSCHAPv2, page B-18

Figure B-3shows the PEAP processing flow between the host, access point, network device, and ACS EAP-TLS server.

Figure B-3 PEAP Processing Flow

Phase 1

Phase 2

Client authenticates the server certificate.

TLS Tunnel is created

User authentication credentials are sent through TLS Tunnel again using EAP.

RADIUS Server authenticates

to user repository.

Client gets network access

AP gets encryption keys

Creating the TLS Tunnel

The following describes the process for creating the TLS tunnel:

271629

1

 

After creating a logical link, the wireless AP sends an

2

The wireless client responds with an

 

 

EAP-Request/Identity message to the wireless client.

 

EAP-Response/Identity message that contains the

 

 

 

 

identity (user or computer name) of the wireless client.

 

 

 

 

 

3

 

The wireless AP sends the EAP-Response/Identity

4

ACS sends an EAP-Request/Start PEAP message to the

 

 

message to ACS. From this point on, the logical

 

wireless client.

 

 

communication occurs between ACS and the wireless

 

 

 

 

 

 

 

client by using the wireless AP as a pass-through device.

 

 

 

 

 

 

 

 

 

 

5

 

The wireless client and ACS exchange a series of TLS

6

At the end of the PEAP negotiation, ACS has

 

 

messages through which the cipher suite for the TLS

 

authenticated itself to the wireless client. Both nodes

 

 

channel is negotiated. In ACS 5.3, the client certificate is

 

have determined mutual encryption and signing keys (by

 

 

not used in PEAP.

 

using public key cryptography, not passwords) for the

 

 

 

 

TLS channel.

 

 

 

 

User Guide for Cisco Secure Access Control System 5.3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

OL-24201-01

 

 

 

B-17

 

 

 

 

 

 

Page 597
Image 597
Cisco Systems OL-24201-01 manual Peap Flow in ACS, Creating the TLS Tunnel