A wireless engineer must configure IEEE 802.1X authentication on a WLAN that supports new and legacy wireless devices. Which condition must be met for the legacy clients to be able to associate and authenticate without issues?
A.
The authenticator and the authentication server must support the same authentication protocol.
B.
The client and the authenticator must support the same authentication protocol.
C.
The client and the controller must support the same authentication protocol.
D.
The client and the authentication server must support the same authentication protocol.
For legacy clients to successfully associate and authenticate using IEEE 802.1X on a WLAN, the client and the authenticator (the Wireless LAN Controller or WLC) must support the same authentication protocol. This ensures that the authentication process can be completed without compatibility issues.
Key Points:
Authenticator: In a wireless network, the authenticator is typically the WLC or the access point (AP) that handles the 802.1X authentication process.
Authentication Protocol: Common protocols include EAP-TLS, PEAP, EAP-FAST, and others. The client and the authenticator must agree on a supported protocol for authentication to succeed.
Legacy Clients: Older devices may only support specific authentication protocols (e.g., PEAP or EAP-MD5), so the authenticator must also support these protocols to accommodate them.
The client and the authentication server must support the same authentication protocol. This is because the authentication server is responsible for verifying the client’s credentials during the authentication process. Therefore, it is essential that both the client and the authentication server support the same authentication protocol to ensure successful authentication.
I think is D. EAP method is only defined on the client (supplicant) and RADIUS Server (Authentication Server). Not on the WLC/AP (Authenticator) from https://community.cisco.com/t5/wireless-mobility-knowledge-base/802-1x-eap-troubleshooting/ta-p/3155512
Provided answer is correct. C. is also sometimes correct if the controller is the authenticator in a given situation but B. is the best answer.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
rrahim
2 days, 13 hours ago[Removed]
4 months, 1 week ago[Removed]
4 months, 1 week agotera671
5 months, 1 week agomohican1
5 months, 1 week agomost_ahdy
6 months ago[Removed]
7 months agoGoldLeader
7 months, 1 week ago