Wireless Local Area Network (WLAN): Security Risk Assessment and Countermeasures
Nwabude
Arinze Sunday - 18 - supports several other different authentication protocols in addition to RADIUS such as Diameter, and Kerberos. Also, the x can be implemented with different EAP types. Figure 7 illustrates the communication
paths of the supplicant, the authenticator and the authenticator server, and the X authentication process.
Share with your friends: