SGS-6341-Series User Manual

Table Of Contents
PEAPProte
c
ted Extensib
le
Authentication Proto
c
ol
They will be described in details in the following part.
Attention:
The switch, as the access controlling unit of Pass-through, will not check the content of a
particular EAP method, so can support all the EAP methods above and all the EAP
authentication methods that may be extended in the future.
In EAP relay, if any authentication method in EAP-MD5, EAP-TLS, EAP-TTLS and PEAP
is adopted, the authentication methods of the supplicant system and the RADIUS server
should be the same.
1. EAP-MD5 Authentication Method
EAP-MD5 is an IETF open standard which providing the least security, since MD5 Hash
function is vulnerable to dictionary attacks.
The following figure illustrated the basic operation flow of the EAP-MD5 authentication
method.
Figure 42-9: the Authentication Flow of 802.1x EAP-MD5
42-78
User’s Manual of SGS-6341 series