{"id":53460,"date":"2020-07-25T09:01:29","date_gmt":"2020-07-25T01:01:29","guid":{"rendered":"https:\/\/version-2.com\/?p=53460"},"modified":"2022-08-01T12:08:55","modified_gmt":"2022-08-01T04:08:55","slug":"802-1x-protocol-for-network-authentication","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2020\/07\/802-1x-protocol-for-network-authentication\/","title":{"rendered":"802.1X Protocol for Network Authentication"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"53460\" class=\"elementor elementor-53460\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f post-content elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/8021x-tile.png\" alt=\"\" width=\"500\" height=\"auto\"><\/p>\n<h3><span style=\"color: #0f92ad;\"><strong>EAP<\/strong><\/span><\/h3>\n<p><a href=\"https:\/\/www.portnox.com\/blog\/cloud-security\/802-1x-authentication-is-simpler-than-you-think\/\">802.1X<\/a> uses an Extensible Authentication Protocol (EAP) for a challenge and response-based authentication protocol that allows a conversation between a <strong>Supplicant <\/strong>(the wireless\/wired client) and the <a href=\"https:\/\/networkradius.com\/how-a-radius-server-works\/\"><strong>RADIUS<\/strong><\/a> (the authentication server), via an <strong>Authenticator<\/strong> (a wired switch or wireless access point which acts as a proxy). EAP supports multiple authentication methods, some of them are secure and some of them are vulnerable (although old endpoints still support them).<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-7754 size-full entered lazyloaded\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3.png\" alt=\"802.1X authentication with Portnox CLEAR\" width=\"1000\" height=\"600\" data-lazy-srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3.png 1000w, https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3-300x180.png 300w, https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3-768x461.png 768w\" data-lazy-sizes=\"(max-width: 1000px) 100vw, 1000px\" data-lazy-src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3.png\" data-ll-status=\"loaded\" sizes=\"(max-width: 1000px) 100vw, 1000px\" srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3.png 1000w, https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3-300x180.png 300w, https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3-768x461.png 768w\"><noscript><img decoding=\"async\" class=\"aligncenter wp-image-7754 size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3.png\" alt=\"802.1X authentication with Portnox CLEAR\" width=\"1000\" height=\"600\" srcset=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3.png 1000w, https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3-300x180.png 300w, https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/802.1x_blog_graphic-v3-768x461.png 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/noscript><\/p>\n<p style=\"text-align: center;\"><em>DIAGRAM: An example of how EAP works with Portnox CLEAR.<\/em><\/p>\n<h3><span style=\"color: #0f92ad;\"><strong>EAP-TLS<\/strong><\/span><\/h3>\n<p>With 802.1X authentication via EAP Transport Layer Security (or <a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000006999\/network-and-i-o\/wireless-networking.html\">EAP-TLS<\/a>), there is a mutual certificate authentication, as it relies on the Supplicant (endpoint) and RADIUS certificate\u2019s \u201chandshake.\u201d<\/p>\n<p><strong>Advantages: <\/strong><\/p>\n<ul>\n<li>Mutual certificate authentication<\/li>\n<li>The authentication process takes place inside a secure SSL tunnel<\/li>\n<li style=\"padding-bottom: 15px;\">The user\/machine certificate is linked to the relevant user\/computer identity, which makes stealing attempts useless (in contrast to stolen credentials)<\/li>\n<\/ul>\n<p><strong>Disadvantages: <\/strong><\/p>\n<ul>\n<li>The identities are sent in a clear text before the certificates exchange process starts<\/li>\n<li>Deployment and lifecycle maintenance of endpoint certificates might be costly in small environments<\/li>\n<\/ul>\n<h3><span style=\"color: #0f92ad;\"><strong>EAP-TTLS<\/strong><\/span><\/h3>\n<p>By using 802.1X EAP Tunneled Transport Layer Security (or <a href=\"https:\/\/www.reddit.com\/r\/sysadmin\/comments\/83x2l2\/difference_between_eaptls_and_eapttls_and_how_to\/\">EAP-TTLS<\/a>) is an extension of EAP-TLS. After the RADIUS is authenticated to the Supplicant by its certificate (including an optional TLS authentication of the Supplicant to the RADIUS), the Supplicant proves its identity via PAP or MSCHAPv2<\/p>\n<p><strong>Advantages: <\/strong><\/p>\n<ul>\n<li>The authentication process takes place inside a secure SSL tunnel<\/li>\n<li>User identity is not exposed<\/li>\n<li>Can use multiple methods to authenticate inside the tunnel \u2013 certificates \/ user identities<\/li>\n<li>EAP-TTLS can be used for network authentication by Azure Identity when AD-DS is not enabled (MSCHAPv2 is not available)<\/li>\n<\/ul>\n<p><strong>Disadvantages: <\/strong><\/p>\n<ul>\n<li>It does not support MSCHCAPv2 without enabling Directory Services with Azure AD (a limitation of Azure AD itself)<\/li>\n<li>Client-side certificate is not required, only optional<\/li>\n<\/ul>\n<h3><span style=\"color: #0f92ad;\"><strong>EAP-PEAP<\/strong><\/span><\/h3>\n<p>With 802.1X authentication via EAP Protected Extensible Authentication Protocol (or <a href=\"https:\/\/securityboulevard.com\/2020\/01\/eap-tls-vs-peap-mschapv2-which-authentication-protocol-is-superior\/\">EAP-PEAP<\/a>), only the RADIUS needs a certificate. With that certificate, the endpoints create an encrypted TLS tunnel to pass the authentication details. The most common protocol used to authenticate the endpoints, when using PEAP, is MSCHAPv2 challenge and response, which is used to authenticate both the server (usually Active Directory \/ Azure AD) and the supplicant (endpoint). The process involves challenge \u2013 response where both share a random hash that\u2019s computed with the identity\u2019s credential without sending the password across the network.<\/p>\n<ul>\n<li>The authentication process takes place inside a secured SSL tunnel<\/li>\n<li>User identity is not exposed<\/li>\n<li style=\"padding-bottom: 15px;\">Simple deployment \u2013 allow the usage of username and password which the end-user is already familiar wit,h such as Active Directory or local account credentials<\/li>\n<\/ul>\n<p><strong>Disadvantages: <\/strong><\/p>\n<ul>\n<li>This method requires a password changing policy to remain secure<\/li>\n<li>If the endpoints are not hardened they are exposed to \u201cevil twin\u201d attacks<\/li>\n<\/ul>\n<h3><span style=\"color: #0f92ad;\"><strong>EAP-MD5<\/strong><\/span><\/h3>\n<p>One of the legacy 802.1X approaches of EAP is Message Digest 5 (or EAP-MD5), the RADIUS server sends a random challenge to the Supplicant which generates an MD5 Hash of its credentials and the challenge, which is then sent back to the RADIUS for validation. By using this method of 802.1X authentication, however, the supplicants don\u2019t send their passwords to the RADIUS for validation, but rather use hashes.<\/p>\n<p><strong>Advantages: <\/strong><\/p>\n<ul>\n<li>EAP-MD5 is compatible with legacy network equipment and older type of endpoints<\/li>\n<\/ul>\n<p><strong>Disadvantages: <\/strong><\/p>\n<ul>\n<li>It is exposed to dictionary attack \u2013 password \u201cguessing\u201d<\/li>\n<li>Vulnerable to man-in-the-middle attacks since there is no mutual authentication<\/li>\n<\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe3e7e5 elementor-widget elementor-widget-shortcode\" data-id=\"fe3e7e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d8c8199 elementor-widget elementor-widget-text-editor\" data-id=\"2d8c8199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><\/p>\n<p><\/p>\n<p><strong>About Distology<\/strong><br>Distology is a Market Enabler and offers true value for the distribution of disruptive IT Security solutions. The vendors we work with represent innovative and exciting technology that continues to excite and inspire their reseller network. Our ethos is based on trust, relationships, energy and drive and offers end to end support in the full sales cycle providing vendor quality technical and commercial resource.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>EAP 802.1X uses an Extensible Authentication Protocol ( [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,61,99],"tags":[423,432,433],"class_list":["post-53460","post","type-post","status-publish","format-standard","hentry","category-portnox","category-press-release","category-year2020","tag-portnox","tag-cloud","tag-nac"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>802.1X Protocol for Network Authentication - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"802.1X Protocol for Network Authentication - Version 2\" \/>\n<meta property=\"og:description\" content=\"EAP 802.1X uses an Extensible Authentication Protocol ( [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-25T01:01:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-01T04:08:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/8021x-tile.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/what-is-802-1x-eap\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2020\\\/07\\\/802-1x-protocol-for-network-authentication\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"802.1X Protocol for Network Authentication\",\"datePublished\":\"2020-07-25T01:01:29+00:00\",\"dateModified\":\"2022-08-01T04:08:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2020\\\/07\\\/802-1x-protocol-for-network-authentication\\\/\"},\"wordCount\":625,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/what-is-802-1x-eap\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/8021x-tile.png\",\"keywords\":[\"Portnox\",\"Cloud\",\"NAC\"],\"articleSection\":[\"Portnox\",\"Press Release\",\"2020\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2020\\\/07\\\/802-1x-protocol-for-network-authentication\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/what-is-802-1x-eap\\\/\",\"name\":\"802.1X Protocol for Network Authentication - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/what-is-802-1x-eap\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/what-is-802-1x-eap\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/8021x-tile.png\",\"datePublished\":\"2020-07-25T01:01:29+00:00\",\"dateModified\":\"2022-08-01T04:08:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/what-is-802-1x-eap\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/what-is-802-1x-eap\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/what-is-802-1x-eap\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/8021x-tile.png\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/uploads\\\/2020\\\/07\\\/8021x-tile.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/what-is-802-1x-eap\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"802.1X Protocol for Network Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"802.1X Protocol for Network Authentication - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/","og_locale":"en_US","og_type":"article","og_title":"802.1X Protocol for Network Authentication - Version 2","og_description":"EAP 802.1X uses an Extensible Authentication Protocol ( [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/","og_site_name":"Version 2","article_published_time":"2020-07-25T01:01:29+00:00","article_modified_time":"2022-08-01T04:08:55+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/8021x-tile.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2020\/07\/802-1x-protocol-for-network-authentication\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"802.1X Protocol for Network Authentication","datePublished":"2020-07-25T01:01:29+00:00","dateModified":"2022-08-01T04:08:55+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2020\/07\/802-1x-protocol-for-network-authentication\/"},"wordCount":625,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/8021x-tile.png","keywords":["Portnox","Cloud","NAC"],"articleSection":["Portnox","Press Release","2020"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2020\/07\/802-1x-protocol-for-network-authentication\/","url":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/","name":"802.1X Protocol for Network Authentication - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/8021x-tile.png","datePublished":"2020-07-25T01:01:29+00:00","dateModified":"2022-08-01T04:08:55+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/8021x-tile.png","contentUrl":"https:\/\/www.portnox.com\/wp-content\/uploads\/2020\/07\/8021x-tile.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/what-is-802-1x-eap\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"802.1X Protocol for Network Authentication"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-dUg","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/53460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=53460"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/53460\/revisions"}],"predecessor-version":[{"id":53464,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/53460\/revisions\/53464"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=53460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=53460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=53460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}