Tech?Update!: Authentication and RADIUS Server deliver Security
Today many IT managers implement complex security architectures in their networks. The centre of most of these architectures: a user based access control mechanism using a central authentication instance.
Compared to device based access control via IP or Mac addresses unauthorised access to the network - e. g. by means of spoofing - will become noticeably more difficult, or even impossible. This particularly applies to Wireless LANs. As a consequence, professional WLAN equipment generally supports various authentication protocols, e. g. EAP-MD5, EAP-TLS or Cisco LEAP.
All three mechanisms use a central authentication server, mostly RADIUS (Remote Access User Dial-In User Service), to verify the access rights of a user. With EAP-MD5 and Cisco LEAP, this is done by means of user names and passwords, while EAP-TLS makes use of certificates. All three mechanisms are supported by all of our WLAN print servers.