8.4 Enterprise WLAN Authentication  
  8.4.5 802.1x authentication types  
Different authentication types are supported when using 802.1x on a WLAN .
  • LEAP - Lightweight EAP (LEAP) is also called EAP-Cisco. LEAP is the Cisco version of EAP. It is used on networks that currently do not support EAP. The current versions of EAP may not provide the functionality that is needed or may be too demanding. This could compromise the performance of the WLAN equipment. LEAP is a good choice when using Cisco equipment in conjunction with operating systems like Windows 95, Windows 98, Windows Me, Windows CE, Windows NT/2000/XP, and Linux.
  • EAP-TLS - EAP-Transport Layer Security (EAP-TLS) is a labor-intensive security option. EAP-TLS requires a digital certificate configured on all WLAN Clients and on the Server. EAP-TLS is based on X.509 certificates. It is usually easier to use than PEAP, which is based on EAP-TLS.
  • PEAP - Protected EAP (PEAP) is a draft EAP authentication type that is designed to allow hybrid authentication. PEAP employs server-side PKI authentication. For client-side authentication, PEAP can use any other EAP authentication type. Because PEAP establishes a secure tunnel via server-side authentication, non-mutually authenticating EAP types can be used for client-side authentication. Client-side authentication options include EAP-GTC for one-time passwords and EAP-MD5 for password-based authentication. PEAP is based on server-side EAP-TLS and it addresses the manageability and scalability shortcomings of EAP-TLS. Organizations can avoid the issues associated with installing digital certificates on every client machine as required by EAP-TLS. They can then select the method of client authentication that best suits them.
  • EAP-MD5 - Extensible Authentication Protocol MD5 (EAP-MD5) should not be used, because it does not provide mutual authentication. EAP-MD5 is a one-way authentication that essentially duplicates CHAP password protection on a WLAN. EAP-MD5 is used as a building block in EAP-TTLS.
  • EAP-OTP - EAP-One Time Passwords (EAP-OTP) is also called EAP- Generic Token Card (EAP-GTC). It is not recommended, since OTPs are not a form of mutual authentication.
  • EAP-SIM - EAP-SIM uses the same smart card or SIM that is used in GSM mobile phones to provide authentication. EAP-SIM can easily ride on EAP-TLS.
  • EAP-TTLS - EAP-Tunneled Transport Layer Security (EAP-TTLS) is an IETF draft authored by Funk software and Certicom. EAP-TTLS provides similar functionality to PEAP. EAP-TTLS protects passwords by using TLS, which is an advanced form of Secure Socket Layer (SSL). EAP-TTLS currently requires a Funk software RADIUS server.
  • Kerberos - Kerberos is not part of the 802.1x standard, but it is being recommended by some vendors. Kerberos is an authentication system enabling protected communication over an open network, which uses a unique key called a ticket. It requires service configuration. PEAP can support Kerberos through EAP-Generic Security Service (EAP-GSS).

 
 

Lab Activity

Lab 8.4.5.1 - Configuring LEAP/EAP using Local RADIUS Authentication

In this lab, the student will learn about the second generation of Wireless LAN security and how to implement LEAP on a Wireless LAN for secure client authentication.

 
 

Lab Activity

Lab 8.4.5.2 - Configuring LEAP/EAP using Cisco Secure ACS

In this lab, the student will learn about the second generation of Wireless LAN security and how to implement LEAP on a Wireless LAN for secure client authentication.

 

 

Interactive Activity

Demostration Activiy: Configure LEAP/EAP using VxWorks GUI

In this activity, students will learn about Cisco VPN devices.