Authentication Method Not Supported by Local RADIUS Server Feature of an Autonomous AP

Unsupported Authentication Method

Question

Which authentication method is not supported when using the local RADIUS server feature of an autonomous AP?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

B.

When an autonomous AP (Access Point) uses the local RADIUS server feature, it uses its own built-in RADIUS server for authentication purposes. This allows the AP to authenticate clients locally without the need for an external RADIUS server.

The various authentication methods supported by the local RADIUS server feature depend on the specific AP model and software version being used. However, in general, the following authentication methods are supported:

  • EAP-PEAP (Protected EAP)
  • EAP-MSCHAPv2 (Microsoft Challenge Handshake Authentication Protocol version 2)
  • EAP-TTLS (Tunneled Transport Layer Security)
  • PEAP-GTC (Generic Token Card)

The answer to this question is A. EAP-FAST. EAP-FAST (Flexible Authentication via Secure Tunneling) is not supported when using the local RADIUS server feature of an autonomous AP. EAP-FAST is a protocol designed for fast and secure authentication of wireless LAN clients, but it requires more complex configuration than other authentication methods, and it is not supported by some APs.

The other options, B. EAP-TLS, C. LEAP, and D. MAC, are all supported authentication methods when using the local RADIUS server feature of an autonomous AP. EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) is a certificate-based authentication method that uses digital certificates for authentication. LEAP (Lightweight Extensible Authentication Protocol) is a Cisco proprietary authentication method that uses a username and password for authentication. MAC (Media Access Control) authentication uses the MAC address of the wireless client for authentication.