Cisco Systems CSACS3415K9 Manual de usuario Pagina 624

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 678
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 623
B-18
User Guide for Cisco Secure Access Control System 5.4
OL-26225-01
Appendix B Authentication in ACS 5.4
PEAPv0/1
Figure B-3 PEAP Processing Flow
Creating the TLS Tunnel
The following describes the process for creating the TLS tunnel:
271629
Phase 1
Phase 2
User authentication credentials are sent
through TLS Tunnel again using EAP.
Client authenticates the server certificate.
TLS Tunnel is created
Client gets network access AP gets encryption keys
RADIUS Server authenticates
to user repository.
1 After creating a logical link, the wireless AP sends an
EAP-Request/Identity message to the wireless client.
2 The wireless client responds with an
EAP-Response/Identity message that contains the
identity (user or computer name) of the wireless client.
3 The wireless AP sends the EAP-Response/Identity
message to ACS. From this point on, the logical
communication occurs between ACS and the wireless
client by using the wireless AP as a pass-through device.
4 ACS sends an EAP-Request/Start PEAP message to the
wireless client.
5 The wireless client and ACS exchange a series of TLS
messages through which the cipher suite for the TLS
channel is negotiated. In ACS 5.4, the client certificate is
not used in PEAP.
6 At the end of the PEAP negotiation, ACS has
authenticated itself to the wireless client. Both nodes
have determined mutual encryption and signing keys (by
using public key cryptography, not passwords) for the
TLS channel.
Vista de pagina 623
1 2 ... 619 620 621 622 623 624 625 626 627 628 629 ... 677 678

Comentarios a estos manuales

Sin comentarios