8021x Dobbelsteijn
8021x Dobbelsteijn
8021x Dobbelsteijn
Erik Dobbelsteijn
General authentication requirements for
access to networks
2
Overview of authentication/
authorisation-mechanisms
1. Open network
2. Open network + MAC-authentication
3. Open network + VPN-gateway
4. Open network + web based gateway
5. WEP (wireless)
6. IEEE 802.1X
3
1. Open network
4
2. Open network + MAC
authentication
• Same as 1, but the MAC-address of the users’
network card is checked by the network
• Operational hassle to administrate MAC
addresses
• MAC addresses can be spoofed
• Guest usage is difficult
5
3. Open netwerk + VPN Gateway
6
4. Open network + web based
gateway
• Open network, an IP-router (Layer 3) gateway
between the WLAN and the institutions network
initially intercepts all traffic and presents a web
page to the user on which the user must enter its
‘credentials’. If they are correct, (certain) traffic is
passed through.
• Vendor-specific
• Guest logon is easy
• Poor scalability (is getting better)
• A browser must be installed, that stays active
during the entire session (also when only using
mail)
7
5. WEP
8
6. IEEE 802.1X
9
802.1X ≠ 802.11x
10
EAP over 802.1x
11
Protocol-overview
CHAP
EAP
EAP
PAP
CHAP
EAP
EAP
PAP
MD5
MD5 TLS
TLS TTLS
TTLS PEAP
PEAP MS-CHAPv2
MS-CHAPv2
EAP
EAP
802.1X
802.1X
PPP
PPP 802.11
802.11
12
How 802.1X works
Ethernet
switch or
Wireless i.e. LDAP
Access RADIUS
Laptop EAPOL EAP over
Point server
or PDA RADIUS
Network
signalling
data
13
How 802.1X works
Ethernet
switch or
Wireless i.e. LDAP
Access RADIUS
Laptop EAPOL EAP over
Point server
or PDA RADIUS
signalling
data
14
Guest usage: RADIUS-proxy
15
How RADIUS proxiing works
Internet
Central RADIUS
Central RADIUS
Proxy server
Proxy server
signalling
data
16
How RADIUS proxiing works
Internet
Central RADIUS
Central RADIUS
Proxy server
Proxy server
signalling
data
17
Differences wired vs wireless
18
Status of 802.1X
19
More info
802.1x http://standards.ieee.org/reading/ieee/std/lanman/802.1X-2001.pdf
20