A network engineer needs to ensure that the access credentials are not exposed during the 802.1X authentication among components. Which two protocols should be configured to accomplish this task? (Choose two.)
Correct answer A and D
sorry is in italian u can translate
https://www.intel.it/content/www/it/it/support/articles/000006999/wireless/legacy-intel-wireless-products.html
EAP-TTLS is a secure protocol that provides strong encryption for the authentication process, but it does not inherently protect the access credentials from exposure during the 802.1X authentication process. EAP-TTLS requires an inner authentication method to be used in conjunction with it, such as PAP or MSCHAPv2, which can potentially expose the access credentials if they are not properly protected. On the other hand, PEAP and EAP-TLS are designed to protect the access credentials during the authentication process, making them more suitable for this specific requirement.
To prevent access credentials from being exposed during 802.1X authentication, it is essential to use protocols that support encryption and secure transport of credentials.
PEAP (Protected Extensible Authentication Protocol): PEAP encapsulates EAP within a TLS (Transport Layer Security) tunnel, protecting the credentials during transmission. PEAP uses server-side certificates to establish a secure connection before the user credentials are sent, keeping them safe from exposure.
EAP-TLS (Extensible Authentication Protocol-Transport Layer Security): EAP-TLS provides mutual authentication between the client and server using digital certificates. This protocol is highly secure, as it relies on certificate-based authentication rather than transmitting user credentials directly, protecting them from interception.
To ensure that access credentials are not exposed during the 802.1X authentication, the two protocols that should be configured are EAP-TLS (Extensible Authentication Protocol-Transport Layer Security) and PEAP (Protected Extensible Authentication Protocol). These protocols provide secure methods for transmitting authentication data between components without exposing sensitive information.
I agree.
"EAP-TTLS balances security versus deployment cost by replacing client-side certificates with legacy password authentication methods, such as Password Authentication Protocol, CHAP and MS-CHAPv2. While the EAP method is still vulnerable to attacks because of its credentials-based client authentication, the TLS encryption does increase security during the exchange of credentials.
To avoid exposing the client's name, EAP-TTLS should be configured to send an anonymous identity when 802.1X starts and then send the actual identity through the TLS tunnel. That tunnel ends when authentication is completed and keys are delivered."
- https://www.techtarget.com/searchnetworking/feature/Choosing-the-right-flavor-of-8021X
--------------------------------------------------
However, just for info, Aruba supports EAP-TLS inner method with EAP-TTLS (not relevant to Cisco exam):
https://www.arubanetworks.com/techdocs/ClearPass/6.7/PolicyManager/Content/CPPM_UserGuide/Auth/AuthMethod_eap-ttls.htm
For me PEAP and EAP-TTLS are the correct answers. The reason is because both are Tunneled-EAP types, which means a tunnel is created between client and server prior to sending the credentials.
A - ISE help: Check this check box to enable PEAP authentication protocol and PEAP settings. The default inner method is MS-CHAPv2.
D - EAP-TTLS suppots inner protocols e.g. EAP-MS-CHAPv2
A,D should be the right answers.
https://www.intel.com/content/www/us/en/support/articles/000006999/wireless/legacy-intel-wireless-products.html
Questions says credentials not to be exposed in other words tunneled which PEAP and TTLS provide.
TLS does not use credentials, MD5 has the poorest security since the hash can be cracked and LEAP uses dynamically generated WEP keys for encryption.
Peap, EAP-TLS and EAP-TTLS are 3 choices of Tunneled EAP Types that encrypts the tunnel, so the crediantals are not exposed. But it is not possibele to geve 3 annser.
So i think they mean what do you have to configure for this session. So you can only configre 1 Tunneled EAP Type (outer method) with 1 inner method.
PEAP (outer) with EAP-TLS (inner) use certificates.
EAP-TTLS (outer) with EAP-MD5 (inner) uses a message digest algorithm to hide the
credentials in a hash
The question was about credentials are not exposed. With certic=ficates, there are no credentials. So the correct answer has to be EAP-TTLS (outer) with EAP-MD5 (CD)
BIG problem with A & D is they are both OUTSIDE tunnels. Correct answer would have to be PEAP (outside) + EAP-TLS (inside) -OR- EAP-TTLS (outside) + EAP-MD5 (inside). With this said, according to Cisco Press ISE book the CORRECT ANSWER is A and B, which is PEAP + EAP-TLS. "Most popular and widely deployed EAP method in the world" according to book.
I think it should be A and D: This question is for non-certificate based authentication, ie, when user/pass is entered on a form. We already know that certificate-based authentication IS protected based on how PKI works. So this question can be worded as 'what protocol would you use to protect both RADIUS attributes User-Name and User-Password?'
In this case, PEAP uses the server (ISE in this case) certificate public key to encrypt the attributes and send them over to ISE for authentication. Interestingly, it looks like PEAP only works with non-certificate credentials (as in "not supported", it can do it).
Then there is EAP-TTLS: It happens that EAP-TLS can ONLY use PKI, the client device MUST have a certificate but this question is related to protecting both non-certificate attributes. EAP-TTLS works in a similar way to PEAP but adds certificate-as-a-credential support (just like EAP-TLS) while still encrypting non-certificate credentials.
https://www.interlinknetworks.com/app_notes/eap-peap.htm (no, it is not a cisco site but it does provide an insight on the PEAP and EAP-TTLS view)
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
MrCalifornia
Highly Voted 3 years, 9 months agozsrite
Highly Voted 1 year, 10 months agoCCNP21
1 year, 6 months agogeroboamo
Most Recent 1 week, 1 day agoUW
2 months agoNullNull88
10 months, 2 weeks agoegxezex
1 year, 4 months ago4793684
1 year, 5 months agoCCNP21
1 year, 6 months agoNikoTomas
11 months agoTHEODORABLE
1 year, 8 months agoYmerG
1 year, 10 months agomiim
1 year, 12 months agoaHash
2 years, 2 months agoiceise
2 years, 2 months agoiceise
2 years, 2 months agoSeawanderer
2 years, 8 months agokthekillerc
2 years, 9 months agoaaInman
3 years, 2 months agothetaken
3 years, 4 months ago