Professional Documents
Culture Documents
, in online banking,
you want to make sure that the remote computer is actually your bank, and not someone
pretending to be your bank. The purpose of 802.1x is to accept or reject users who want full
access to a network using 802.1x. It is a security protocol that works with 802.11 wireless
networks such as 802.11b,g,n, as well as with wired devices.
All NETGEAR ProSAFE Layer 2 and Layer 3 switches support this authentication.
NETGEAR access points with full WPA (WPA Enterprise) support 802.1x, e.g.,
WG103, WNDAP350, WNDAP360.
1. EAP-MD5 uses standard user name and password. The supplicant’s password is hashed
with MD5 and the hash value is being used to authenticate the supplicant.
2. LEAP is Cisco’s Lightweight EAP, and works mainly with Cisco products. It also uses
MD5 hash, but both the supplicant and authentication server are authenticated.
3. EAP-TTLS uses PKI to authenticate the authentication server. However, it supports a
different set of authenticate methods (e.g. CHAP, PAP, MS-CHAP v2) to authenticate the
supplicant.
4. PEAP (Protected EAP), which is built-in to Windows XP, uses PKI to authenticate the
authentication server. It supports any type of EAP to authenticate the supplicant including
certificate.
***Windows 7+ OS versions have a service ' Wired AutoConfig' which is set to manual as default.
Set this to automatic and it should begin working.