Appendix D Wireless LANs
TTLS supports EAP methods and legacy authentication methods such as PAP, CHAP,
PEAP (Protected EAP)
Like
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE 802.1x.
Dynamic WEP Key Exchange
The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed.
If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen. You may still configure and store keys, but they will not be used while dynamic WEP is enabled.
Note:
For added security,
Table 128 Comparison of EAP Authentication Types
| PEAP | LEAP | |||
Mutual Authentication | No | Yes | Yes | Yes | Yes |
|
|
|
|
|
|
Certificate – Client | No | Yes | Optional | Optional | No |
|
|
|
|
|
|
Certificate – Server | No | Yes | Yes | Yes | No |
|
|
|
|
|
|
Dynamic Key Exchange | No | Yes | Yes | Yes | Yes |
|
|
|
|
|
|
Credential Integrity | None | Strong | Strong | Strong | Moderate |
|
|
|
|
|
|
Deployment Difficulty | Easy | Hard | Moderate | Moderate | Moderate |
|
|
|
|
|
|
Client Identity | No | No | Yes | Yes | No |
Protection |
|
|
|
|
|
|
|
|
|
|
|
| 373 |
|
|