- play_arrow Login Classes and Login Settings
- play_arrow User Accounts
- play_arrow Passwords for User Access
- play_arrow Trusted Platform Module
- play_arrow User Authentication
- play_arrow Remote Access Management
- play_arrow Configuring IEEE 802.1x Port-Based Network Access Control
- play_arrow Configuring IEEE 802.1x Port-Based Network Access Control in Enhanced LAN Mode
- 802.1X for MX Series Routers in Enhanced LAN Mode Overview
- Understanding 802.1X and LLDP and LLDP-MED on MX Series Routers in Enhanced LAN Mode
- Understanding 802.1X and RADIUS Accounting on MX Series Routers in Enhanced LAN Mode
- Understanding 802.1X and VoIP on MX Series Routers in Enhanced LAN Mode
- Understanding Guest VLANs for 802.1X on MX Series Routers in Enhanced LAN Mode
- Understanding Dynamic VLANs for 802.1X on MX Series Routers in Enhanced LAN Mode
- Understanding Server Fail Fallback and Authentication on MX Series Routers in Enhanced LAN Mode
- Configuring 802.1X RADIUS Accounting on MX Series Routers in Enhanced LAN Mode
- Configuring 802.1X Interface Settings on MX Series Routers in Enhanced LAN Mode
- Configuring LLDP-MED on MX Series Routers in Enhanced LAN Mode
- Configuring LLDP on MX Series Routers in Enhanced LAN Mode
- Configuring Server Fail Fallback on MX Series Routers in Enhanced LAN Mode
- Understanding Captive Portal Authentication on the MX Series Routers
- Understanding Authentication Session Timeout on MX Series Routers
- Authentication Process Flow for MX Series Routers in Enhanced LAN Mode
- Specifying RADIUS Server Connections on an MX Series Router in Enhanced LAN Mode
- Configuring Captive Portal Authentication on MX Series Routers in Enhanced LAN Mode
- Designing a Captive Portal Authentication Login Page on an MX Series Router
- Configuring Static MAC Bypass of Authentication on MX Series Routers in Enhanced LAN Mode
- Controlling Authentication Session Timeouts on an MX Series Router in Enhanced LAN Mode
- Configuring MAC RADIUS Authentication on MX Series Routers in Enhanced LAN Mode
- Example: Configuring MAC RADIUS Authentication on an MX Series Router
- Example: Setting Up Captive Portal Authentication on an MX Series Router
- Example: Connecting a RADIUS Server for 802.1X to an MX Series Router
- Example: Setting Up 802.1X in Conference Rooms to Provide Internet Access to Corporate Visitors on an MX Series Router
- Example: Configuring Static MAC Bypass of Authentication on an MX Series Router
- Example: Applying Firewall Filters to Multiple Supplicants on Interfaces Enabled for 802.1X or MAC RADIUS Authentication on MX Series Routers
- play_arrow Device Discovery
- play_arrow Domain Name Security
- play_arrow Permission Flags
- access
- access-control
- admin
- admin-control
- all
- clear
- configure
- control
- field
- firewall
- firewall-control
- floppy
- flow-tap
- flow-tap-control
- flow-tap-operation
- idp-profiler-operation
- interface
- interface-control
- maintenance
- network
- pgcp-session-mirroring
- pgcp-session-mirroring-control
- reset
- rollback
- routing
- routing-control
- secret
- secret-control
- security
- security-control
- shell
- snmp
- snmp-control
- system
- system-control
- trace
- trace-control
- view
- view-configuration
- play_arrow Configuration Statements and Operational Commands
Configuring PEAP for MAC RADIUS Authentication
Extensible Authentication Protocol (EAP) is an extensible protocol that provides support for multiple authentication methods, including password-based authentication methods and more secure certificate-based authentication methods. EAP facilitates the negotiation between the authenticator, or switching device, and the authentication server, to determine which authentication method to use for a supplicant. The default authentication method used for MAC RADIUS authentication is EAP-MD5, in which the server sends the client a random challenge value, and the client proves its identity by hashing the challenge and its password with MD5. Because EAP-MD5 only provides for client authentication and not for server authentication, it can be vulnerable to spoofing attacks.
You can configure the Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, to address the security vulnerabilities of EAP-MD5. PEAP is a protocol that encapsulates EAP packets within an encrypted and authenticated Transport Layer Security (TLS) tunnel. PEAP is referred to as the outer authentication protocol because it sets up the tunnel and is not directly involved with authenticating the endpoints. The inner authentication protocol, used to authenticate the client’s MAC address inside the tunnel, is Microsoft Challenge Handshake Authentication Protocol version 2 (MS-CHAPv2). The encrypted exchange of information inside the tunnel ensures that user credentials are safe from eavesdropping.
One of the advantages of PEAP, when used with MS-CHAPv2, is that it requires only a server-side certificate to establish the secure tunnel, and uses server-side public key certificates to authenticate the server. This eliminates the overhead involved in deploying digital certificates for every client that requires authentication.
Once a client has been authenticated on the switch using MAC RADIUS authentication, subsequent clients can use the same outer tunnel that was established by the first client to communicate with the server. This is achieved using the session resumption functionality provided by SSL. Session resumption reduces latency that can occur as subsequent clients wait for a new TLS tunnel to be established.
Before you configure the PEAP authentication protocol for MAC RADIUS authentication, make sure that the authentication server is also configured to use PEAP with MS-CHAPv2 as the inner authentication protocol. For information about configuring the authentication server, consult the documentation for your server.
The authentication protocol can be configured globally using the interface
all
option as well as locally using the individual interface name. If the
authentication protocol is configured both for an individual interface and for all
interfaces, the local configuration for that interface overrides the global
configuration.
To configure the PEAP authentication protocol for MAC RADIUS authentication: