Unit 5-Extensible Authentication Protocol
Unit 5-Extensible Authentication Protocol
EAP methods protect a specific portal so that only users with an authentication key or
password can get network access. These methods limit the number of users and help
prevent network congestion, making networks faster and more secure. Organizations can
use EAP methods to adapt to specific privacy needs and company guidelines.
Extensibility is a key trait of the EAP framework. Some main features of the protocol
include the following:
It provides the framework within which the various authentication methods work.
2. The AP requests identification data from the user and transmits that data to an
authentication server.
3. The authentication server asks the AP for proof of the validity of the identification
information.
4. The AP obtains verification from the user and sends it back to the authentication
server.
EAP-TLS provides certificate-based, mutual authentication of the network and the client.
Both the client and the server must have certificates to perform this authentication. EAP-
TLS randomly generates session-based, user-based Wired Equivalent Privacy (WEP)
keys. These keys secure communications between the AP and the WLAN client.
One disadvantage of EAP-TLS is the server and client side both must manage the
certificates. This can be challenging for organizations with an extensive WLAN.
EAP-TTLS (Tunneled TLS)
Cisco created this proprietary EAP authentication type for mutual client and server
authentication on its WLANs. The LEAP server sends the client a random challenge, and
the client returns a hashed password. Once authenticated, the client asks the server for a
password, and a key exchange follows.
PEAP was created as a more secure version of LEAP. Like EAP-TTLS, PEAP
authenticates clients using server-side certificates. It creates a TLS tunnel from the server
to the client so the client can be authenticated through that encrypted tunnel. Unlike EAP-
TTLS, with PEAP, the client must use a different EAP type.
Cisco created EAP-FAST to replace LEAP. EAP-FAST uses a tunnel to provide mutual
authentication like PEAP and EAP-TTLS. EAP-FAST does not have the server
authenticate itself with a digital certificate. Instead, it uses a Protected Access Credential,
which creates a one-time provisioning exchange with a shared secret, or PAC key. The
PAC key handles the authentication.
This authentication type is based on the Global System for Mobile communication
(GSM) SIM card used in cellphones. It uses a per-session WEP key to encrypt the data.
This authentication method requires the client to enter a verification code to enable
communication with the SIM. EAP-SIM 802.1X requests go through a carrier's roaming
gateway to a GSM authentication server. It is used to authenticate devices that roam
between commercial 802.11 hotspots and GSM networks.
EAP-MD5 offers a base level of support and is not recommended when implementing a
WLAN. It is easier for threat actors to determine the user's or client's password with this
method. It also only provides one-way authentication rather than mutual authentication,
and there is no way to develop per-session WEP keys or offer a continuous rotation and
distribution of WEP keys. The manual maintenance of the WEP keys can pose
challenges.