User's Manual

C
HAPTER
4
| Administrator Mode
Editing a Profile
– 26 –
Clicking the Authentication tab on the Profile screen displays the user
authentication settings.
Figure 22: Profile Screen - Authentication
EAP Method — Selects the Extensible Authentication Protocol (EAP)
method to use for authentication. When EAP-TTLS or EAP-TLS is selected,
the appropriate parameters need to be configured.
EAP-TTLS-MS-CHAP-V2 Tunneled Transport Layer Security with
Microsoft’s version 2 of CHAP (Challenge-Handshake Authentication
Protocol). This security method provides for certificate-based, mutual
authentication of the client and network through an encrypted channel.
Unlike EAP-TLS, EAP-TTLS requires only server-side certificates. The
MS-CHAP protocol requires a user name and password to be
configured. The user name and password can be up to 50 characters.
(The following characters are not permitted; /\|”?@#$%^&*():;<>,. )
EAP-TLS — Transport Layer Security. Provides for certificate-based and
mutual authentication of the client and the network. It relies on client-
side and server-side certificates to perform authentication and can be
used to dynamically generate user-based and session-based encryption
keys to secure subsequent communications between the user and the
network.
Outer NAIThe Network Access Identifier (NAI) text string that is used
to identify the home authentication realm for device authentication during
roaming. The NAI string (defined in RFC 4282) is used to proxy an
authentication request to another remote server. The authentication is then
performed using the unique X.509 authentication certificate included with
the device. The string can be defined by three methods: