Extensible Authentication Protocol
Extensible Authentication Protocol
1. General EAP
Extensible authentication protocol is a general authentication
framework, which support multiple authetication methods.
The advantages of EAP :
The EAP protocol can support multiple authentication
mechanisms without having to pre-negotiate a particular one
Network Access Server (NAS) devices ( e.g switch or access point)
do not have to understand each authentication method and may
act as a pass-through agent for a backend authentication server.
Seperation between authenticator and backend authentication
server simplifies credentials management and policy decision
making.
The disadvantages of EAP :
Where
the
authenticator
is
separeted
from
backend
authentication server, this complicates the security analysis and
if needed, the key distribution.
EAP implementation consist three key components :
Lower layer : is responsible for transmitting and receiving EAP
frames between the peer and the authenticator
EAP layer : is responsible for receives and transmits EAP packets
via
Lower
Layer,
implement
duplicate
detection
and
retranmissions.
EAP method : is responsible for implementation of authentication
algorithm, receives/transmit EAP messages via EAP layer.
EAP SIM
sessions is still connected. After the users roams out the range of AP,
or turn off their devices, the AP will send message Stop to Radius
server, indicating the wireless sessions is completed. All the data could
be stored in SQL database for billing.