CCIE Security: Valid EAP Mechanisms for WPA2

Valid EAP Mechanisms for WPA2

Prev Question Next Question

Question

Which four options are valid EAP mechanisms to be used with WPA2? (Choose four.)

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D. E. F. G.

ABCD.

WPA2 (Wi-Fi Protected Access 2) is a security protocol for wireless networks. EAP (Extensible Authentication Protocol) is a framework for network authentication. EAP can be used with WPA2 to provide secure authentication and key management for wireless clients. The following are valid EAP mechanisms to be used with WPA2:

A. PEAP (Protected Extensible Authentication Protocol): PEAP is an EAP authentication protocol that encapsulates EAP traffic inside a TLS tunnel. PEAP provides mutual authentication between the client and the authentication server, and protects the authentication process from eavesdropping and man-in-the-middle attacks.

B. EAP-TLS (Extensible Authentication Protocol-Transport Layer Security): EAP-TLS is an EAP authentication protocol that uses mutual certificate-based authentication between the client and the authentication server. EAP-TLS requires the installation of digital certificates on both the client and the authentication server.

C. EAP-FAST (Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling): EAP-FAST is an EAP authentication protocol that uses a TLS tunnel to protect EAP exchanges. EAP-FAST is designed to provide fast reauthentication and is suitable for use in wireless networks with a large number of clients.

D. EAP-TTLS (Extensible Authentication Protocol-Tunneled Transport Layer Security): EAP-TTLS is an EAP authentication protocol that uses a TLS tunnel to protect EAP exchanges. EAP-TTLS provides mutual authentication between the client and the authentication server and is suitable for use in wireless networks that require strong authentication.

E. EAPOL (Extensible Authentication Protocol over LAN): EAPOL is not an EAP mechanism, but rather a protocol used to transport EAP messages over a wired or wireless LAN. EAPOL is used in WPA2 to transport EAP messages between the client and the authentication server.

F. EAP-RADIUS (Extensible Authentication Protocol-Remote Authentication Dial-In User Service): EAP-RADIUS is not an EAP mechanism, but rather a protocol used to transport EAP messages between the wireless client and the RADIUS server. RADIUS is a popular authentication and accounting protocol used in many networks.

G. EAP-MD5 (Extensible Authentication Protocol-Message Digest 5): EAP-MD5 is an EAP authentication protocol that uses a hash function to provide mutual authentication between the client and the authentication server. EAP-MD5 is not considered a secure authentication mechanism and should not be used in environments that require strong security.

In conclusion, the valid EAP mechanisms to be used with WPA2 are PEAP, EAP-TLS, EAP-FAST, and EAP-TTLS. EAPOL, EAP-RADIUS, and EAP-MD5 are not EAP mechanisms, but rather protocols used to transport EAP messages over the network.