
Designing Access Controls
Select an EAP Method for 802.1X
Table
Table 3-75. EAP Methods Supported by 802.1X Supplicants
802.1X |
|
|
| PEAP |
|
| LEAP | ||
Supplicant |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Windows |
| X |
|
|
| X |
|
|
|
native |
|
|
|
| Inner |
|
|
| |
|
|
|
|
| protocol: |
|
|
| |
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
Mac native | X | X |
| X |
| X |
|
| X |
|
|
| Inner | Inner |
|
|
| ||
|
|
| protocol: | protocol: |
|
|
| ||
|
|
| • | PAP |
|
|
| ||
|
|
| • | MS- |
|
|
|
|
|
|
|
|
| CHAPv2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Xsupplicant | X | X |
| X |
| X | X | X | X |
|
|
| Inner | Inner |
|
|
| ||
|
|
| protocol: | protocol: |
|
|
| ||
|
|
| • | PAP | • | GTC |
|
|
|
|
|
| • | CHAP | • | MS- |
|
|
|
|
|
| • |
| CHAPv2 |
|
|
| |
|
|
| • | MS- |
|
|
|
|
|
|
|
|
| CHAPv2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Juniper | X | X |
| X |
| X | X |
| X |
Odyssey |
|
| Inner | Inner |
|
|
| ||
|
|
| protocol: | protocol: |
|
|
| ||
|
|
| • | UAC | • | UAC |
|
|
|
|
|
| • | MS- | • | MS- |
|
|
|
|
|
|
| CHAPv2 |
| CHAPv2 |
|
|
|
|
|
|
|
|
|
|
|
|
|
ProCurve | X |
|
|
|
|
|
|
|
|
Switches, |
|
|
|
|
|
|
|
|
|
APs, and RPs |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
As you can see, if you are using the native Windows supplicant, you should choose PEAP with Microsoft Challenge Handshake Authentication Pro- tocol version 2