Hi Piotr In that case why would we need a secure channel, if there is no further authentication?
With regards Kings On Sun, Jan 9, 2011 at 3:33 AM, Piotr <[email protected]> wrote: > Hi Kings, > > There is no additional authentication method used since EAP-TLS > authenticates the client. In fact the username from CN is taken and compared > to the user in the ACS. > > Regards, > Piotr > > Dnia Jan 8, 2011 o godz. 12:42 PM Kingsley Charles < > [email protected]> napisaĆ(a): > > Ignore the "Why would I need a secure channel as there is not further > communication?" I just want to what is the authentication method used after > getting the secure channel. > > With regards > Kings > > On Sat, Jan 8, 2011 at 5:08 PM, Kingsley Charles <<[email protected]> > [email protected]> wrote: > >> Hi all >> >> EAP TLS mutually authenticates the client and authenticator with cert >> certification after which secure channel is established. Why would I need a >> secure channel as there is not further communication. >> >> What is the authentication method used in the secure channel, is it MD5 >> authentication? >> >> With regards >> KIngs >> > > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit <http://www.ipexpert.com>www.ipexpert.com > >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
