The document provides an overview of wireless authentication using EAP, RADIUS, certificates, and SSL. It includes a diagram of the EAP authentication flow and describes common 802.1x authentication methods like EAP-TLS. Useful OpenSSL commands are listed to generate and convert certificate and key files.
The document provides an overview of wireless authentication using EAP, RADIUS, certificates, and SSL. It includes a diagram of the EAP authentication flow and describes common 802.1x authentication methods like EAP-TLS. Useful OpenSSL commands are listed to generate and convert certificate and key files.
The document provides an overview of wireless authentication using EAP, RADIUS, certificates, and SSL. It includes a diagram of the EAP authentication flow and describes common 802.1x authentication methods like EAP-TLS. Useful OpenSSL commands are listed to generate and convert certificate and key files.
Number Description Number Description 1 Login 0 Async QUERYING A TABLE 2 Framed 1 Sync 3 Callback Login 2 ISDN Sync SELECT c1, c2 FROM t; 4 Callback Framed 3 ISDN Async V.120 Query data in columns c1. c2 from a table 5 Outbound 4 ISDN Async V.110 5 Virtual SELECT * FROM t; 6 Administrative 6 PIAFS Query all roves and columns from a table 7 NAS Prompt 7 HDLC Clear Channel 8 Authenticate Only SELECT c1, c2 FROM t; 8 X.25 9 Callback NAS Prompt WHERE condition; 9 X.75 10 Call Check Query data and filter With a condition 10 G.3 Fax 11 Callback Administrative 11 SDSL - Symmetric DSL 12 Voice SELECT DISTINCT c1 FROM t; 12 ADSL-CAP - Asymmetric DSL 13 Fax 13 ADSL-DMT - Asymmetric DSL WHERE condition; 14 Modem Relay 14 IDSL - ISDN Digital Subscriber Line Query distinct row.s froma table 15 IAPP-Register 15 Ethernet 16 IAPP-AP-Check 16 xDSL - Digital Subscriber Line of unknown type SELECT c1, c2 FROM t; 17 Authorize Only 17 Cable ORDER BY c1 ASC [DESC]; 18 Framed-Management 18 Wireless - Other Sort the result set in ascending or descending order 19 Additional-Authorization 19 Wireless - IEEE 802.11