description.txt 823 B

123456789101112
  1. The roadwarriors <b>carol</b> and <b>dave</b> set up a connection each to gateway <b>moon</b>
  2. using EAP-TTLS authentication only with the gateway presenting a server certificate and
  3. the clients doing EAP-MD5 password-based authentication.
  4. In a next step the EAP-TNC protocol is used within the EAP-TTLS tunnel to determine the
  5. health of <b>carol</b> and <b>dave</b> via the <b>IF-TNCCS 2.0</b> client-server interface
  6. compliant with <b>RFC 5793 PB-TNC</b>. The IMC and IMV communicate are using the <b>IF-M</b>
  7. protocol defined by <b>RFC 5792 PA-TNC</b>.
  8. <p>
  9. <b>carol</b> passes the health test and <b>dave</b> fails. Based on these measurements
  10. <b>carol</b> is authenticated successfully and is granted access to the subnet behind
  11. <b>moon</b> whereas <b>dave</b> fails the layered EAP authentication and is rejected.
  12. </p>