EAP
- Extensible Authentication Protocol is the authentication framework that other wireless authentication methods are built on
- EAP Methods
- LEAP (Lightweight EAP)
- Developed by Cisco
- Vulnerable, should not be used anymore
- Clients provide credentials
- Mutual authentication occurs
- EAP-FAST (EAP Flexible Authentication via Secure Tunneling)
- Developed by Cisco
- Three phases
- a PAC (Protected Access Credential) is generated and passed from the server to the client
- a secure TLS tunnel is established between the client and the authentication server
- Inside the encrypted TLS tunnel, the client and server authenticate
- PEAP (Protected EAP)
- Like EAP-FAST, it creates a secure TLS tunnel
- Instead of a PAC, the server uses a digital cert for authentication and establishing a TLS tunnel
- Client still needs to authenticate with credentials through the tunnel, like with MS-CHAP (Microsoft Challenge-Handshake Authentication Protocol)
- EAP-TLS (EAP Transport Layer Security)
- Requires both client and server authenticate using certificates outside of the tunnel
- However, TLS tunnel still used to exchange encryption key information
- Most secure, but most difficult to implement
OSI or TCP/IP Layer
CCNA Exam Topic
Contributors
Sources