User's Manual

enables data encryption. This authentication method causes all data to
be encrypted.
MS-CHAP-V2: Iintroduces an additional feature not available with
MSCHAPV1 or standard CHAP authentication, the change password
feature. This feature allows the client to change the account password if
the RADIUS server reports that the password has expired.
PEAP
PEAP is a new Extensible Authentication Protocol (EAP) IEEE 802.1x
authentication type designed to take advantage of server-side EAP-Transport
Layer Security (EAP-TLS) and to support various authentication methods,
including users' passwords and one-time passwords, and Generic Token Cards.
Authentication Protocols
Generic Token Card (GTC): Carries user specific token cards for
authentication. The main feature in GTC is Digital Certificate/Token Card-
based authentication. In addition, GTC includes the ability to hide user
name identities until the TLS encrypted tunnel is established, which
provides additional confidentiality that user names are not being
broadcasted during the authentication phase.
MS-CHAP-V2: Refer to MS-CHAP-V2 above.
TLS: The TLS protocol is intended to secure and authenticate
communications across a public network through data encryption. The
TLS Handshake Protocol allows the server and client to provide mutual
authentication and to negotiate an encryption algorithm and
cryptographic keys before data is transmitted. Refer to
TLS above.
Cisco Features
Cisco LEAP
Cisco LEAP (Cisco Light EAP) is a server and client 802.1x authentication
through a user-supplied logon password. When a wireless access point
communicates with a Cisco LEAP-enabled RADIUS (Cisco Secure Access
Control Server [ACS]), Cisco LEAP provides access control through mutual