Actually we are not really testing EAP-TTLS-EAP-MSCHAPV2 but more
EAP-TTLS-EAP-*.

SecureW2 as you know runs on the Microsoft EAP stack. SecureW2 2
can now use the same EAP stack to call EAP-Modules which are
then sent through the EAP-TTLS tunnel to the back-end.

One benefit of using the Microsof EAP-MSCHAPV2 is that you can
now use Windows credentials with SecureW2 which means single 
sign on. It also means you can use TTLS on a Microsoft IAS back-end
as I show in a previous e-mail.

It also means more flexibility. SecureW2 can tunnel any
Microsoft EAP module through EAP-TTLS. I have even tunneled
EAP-MSCHAPV2 though PEAP through EAP-TTLS :) Pretty cool... but 
pretty useless.... But if in the future a EAP module is required
that cannot do encryption on it's own simply tunnel it through
TTLS.

Regards,

Tom.


> -----Original Message-----
> From: Rok Papez [mailto:[EMAIL PROTECTED]
> Sent: Tuesday, March 09, 2004 2:13 PM
> To: [EMAIL PROTECTED]
> Subject: Re: EAP-TTLS authentication failed
> 
> 
> Hello Tom.
> 
> Tom Rixom wrote:
> 
> > Just a quick remark without sounding too arrogant... 
> > 
> > what we are doing is:
> > EAP-TTLS-EAP-MSCHAPV2 not EAP-TTLS-MSCHAPV2.
> > 
> > The first uses what we call Inner EAP, the second is using 
> the normal
> > MSCHAPV2 within TTLS.
> 
> What is the benefit of using Inner EAP + CHAP over normal 
> CHAP within TTLS ?
> 
> -- 
> Lep pozdrav,
> Rok Papez.
> 
> - 
> List info/subscribe/unsubscribe? See 
> http://www.freeradius.org/list/users.html
> 

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to