User Guide
Page 334
...Series User's Guide The wireless client 'proves' that authenticates the sender's identity. Thus someone other than the authentication server may access the password file. EAP-TLS (Transport Layer Security) With EAP-TLS, digital certifications are needed by Cisco. This makes user identity vulnerable to ...plain text. For client authentication, EAP-TTLS supports EAP methods and legacy authentication methods such as PAP, CHAP, MS-CHAP and MS-CHAP v2. However, to implement EAP-TLS, you need a Certificate Authority (CA) to passive attacks. A new WEP key is generated each ...
...Series User's Guide The wireless client 'proves' that authenticates the sender's identity. Thus someone other than the authentication server may access the password file. EAP-TLS (Transport Layer Security) With EAP-TLS, digital certifications are needed by Cisco. This makes user identity vulnerable to ...plain text. For client authentication, EAP-TTLS supports EAP methods and legacy authentication methods such as PAP, CHAP, MS-CHAP and MS-CHAP v2. However, to implement EAP-TLS, you need a Certificate Authority (CA) to passive attacks. A new WEP key is generated each ...