Appendix E Wireless LANs
PEAP (Protected EAP)
Like
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x.
Dynamic WEP Key Exchange
The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed.
If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled.
"
For added security,
Table 184 Comparison of EAP Authentication Types
| PEAP | LEAP | |||
Mutual Authentication | No | Yes | Yes | Yes | Yes |
|
|
|
|
|
|
Certificate – Client | No | Yes | Optional | Optional | No |
|
|
|
|
|
|
Certificate – Server | No | Yes | Yes | Yes | No |
|
|
|
|
|
|
Dynamic Key Exchange | No | Yes | Yes | Yes | Yes |
|
|
|
|
|
|
Credential Integrity | None | Strong | Strong | Strong | Moderate |
|
|
|
|
|
|
Deployment Difficulty | Easy | Hard | Moderate | Moderate | Moderate |
|
|
|
|
|
|
Client Identity Protection | No | No | Yes | Yes | No |
|
|
|
|
|
|
WPA
User Authentication
WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless stations using an external RADIUS database.
414 |
| |
| ||
|
|
|