XGS-5240-Series User Manual

Table Of Contents
Configuration Guide of XGS-5240-Series
47-11
open standard. It has long been utilized in products and provides very good security. I
ts design of protocol and security is similar to that of EAP-TTLS, using a server’s PKI
certificate to establish a safe TLS tunnel in order to protect user authentication.
The following figure illustrates the basic operation flow of PEAP authentication meth
od.
Fig 3-11 the Authentication Flow of 802.1x PEAP
1.1.1.24 EAP Termination Mode
In this mode, EAP messages will be terminated in the access control unit and map
ped into RADIUS messages, which is used to implement the authentication, authorizatio
n and fee-counting. The basic operation flow is illustrated in the next figure.
In EAP termination mode, the access control unit and the RADIUS server can use
PAP or CHAP authentication method. The following figure will demonstrate the basic op
eration flow using CHAP authentication method.