Specifications
About Keys and Certificates
16-2 Managing Keys and Certificates
Wireless Security through TLS
Inthecaseofwirelessorwiredauthentication802.1Xuserswhoseauthenticationisperformedby
theRoamAboutswitch,thefirststageofanyEAPtransactionisTr ansportLayerSecurity(TLS)
authenticationandencryption.RoamAboutSwitchManagerandWebViewalsorequireasession
totheRoamAboutswitchthatisauthenticatedand
encryptedbyTLS.OnceaTLSsessionis
authenticated,itisencrypted.
TLSallowstheclienttoauthenticatetheRoamAboutswitch(andoptionallyallowsthe
RoamAboutswitchtoauthenticatethe client)throughtheuseofdigitalsignatures.Digital
signaturesrequireapublic‐privatekeypair.Thesignatureiscreatedwitha
privatekeyand
verifiedwithapublic key.TLSenablessecurekeyexchange.
PEAP-MS-CHAP-V2 Security
PEAPperformsaTLSexchangeforserverauthenticationandallowsasecondarya uthenti cationto
beperformedinsidetheresultingsecurechannelforclientauthentication.Forexample,the
MicrosoftChallengeHandshakeAuthenticationProtocolversion 2(MS‐CHAP ‐V2)performs
mutualMS‐CHAP‐V2authenticationinsideanencryptedTLSchannelestablishedbyPEAP.
1. To
formtheencryptedTLSchannel,theRoamAboutswitchmusthaveadigitalcertificateand
mustsendthatcertificatetothewirelessclient.
2. InsidetheRoamAboutswitch’sdigitalcertificateistheRoamAboutswitch’spublickey,which
thewirelessclientusestoencryptapre‐mastersecretkey.
3. Thewirelessclientthensends
thekeybacktotheRoamAboutswitchsothatboththe
RoamAboutswitchandtheclientcanderiveakeyfromthispre‐mastersecretforsecure
authenticationandwirelesssessionencryption.
ClientsauthenticatedbyPEAPneedacertificateintheRoamAboutswitchonlywhentheswitch
performsPEAPlocally,
notwhenEAPprocessingtakesplaceonaRADIUSserver.(Fordetails
aboutauthenticationoptions,seeChapter 17,ConfiguringAAAforNetworkUsers.)
About Keys and Certificates
Public‐privatekeypairsanddigitalsignaturesandcertificatesallowkeystobegenerated
dynamicallysothatdatacan besecurelyencryptedanddelivered.Yougeneratethekeypairsand
certificatesontheRoamAboutswitchorinstallthemontheswitchafterenrollingwithacertificate
authority(CA).TheRoamAboutswitch
cangeneratekeypairs,self‐signedcertificates,and
CertificateSigningRequests(CSR s),andcaninstallkeypairs,servercertificates,andcertificates
generatedbyaCA.
WhentheRoamAboutswitchneedstocommunicatewithRoamAboutSwitchManager,Web
View,oran802.1XorWebAAAclient,MSSrequestsaprivat ekeyfromthe
switch’scertificateand
keystore:
•IfnoprivatekeyisavailableintheRoamAboutswitch’scertificateandkeystore,theswitch
doesnotrespondtotherequestfromMSS.Iftheswitchdoeshaveaprivatekeyinitskey
store,MSSrequestsacorrespondingcertificate.
Note: The RoamAbout switch uses separate server certificates for Admin, EAP (802.1X), and
Web AAA authentication. Where applicable, the manuals refer to these server certificates as Admin,
EAP (or 802.1X), or Web AAA certificates respectively.