Course Content
Spanning Tree
An overview of how switches become aware of other switches and prevent loops.
0/2
Multiple Spanning Tree Protocol (MST)
0/1
Advanced OSPF
The (OSPF) protocol scales well with proper network planning. IP addressing schemes, area segmentation, address summarization, and hardware capabilities for each area should considered when designing a network.
0/6
Introduction to Automation Tools  
To provide a high-level overview of some of the most common configuration management and automation tools that are available.
0/3
ENCOR Course
About Lesson

Authenticating with EAP

authenticating clients with Extensible Authentication Protocol (EAP).

  • Rather than build additional authentication methods into the 802.11 standard, EAP offers a more flexible and scalable authentication framework.
  • EAP is extensible and does not consist of any one authentication method. Instead, EAP defines a set of common functions that actual authentication methods can use to authenticate users.
  • It can integrate with the IEEE 802.1x port-based access control standard. When 802.1x enabled, it limits access to a network medium until a client authenticates. This means that a wireless client might be able to associate with an AP but will not be able to pass data to any other part of the network until it successfully authenticates.

802.1x Client Authentication Roles

Configuring EAP-Based Authentication with External RADIUS Servers

  • Next, enable 802.1x authentication on the WLAN.

Configuring EAP-Based Authentication with Local EAP

  • If your environment is small or you do not have a RADIUS server, you can use Local EAP.
  • It supports LEAP, EAP-FAST, PEAP, EAP-TLS.
  • Define and enable the local EAP service on the controller. Navigate to Security > Local EAP > Profiles and click the New button. Enter a name for the Local EAP profile, which will be used to define the authentication server methods.

 

 

Other useful information:

Join the conversation