EasyManuals Logo
Home>AMX>Touch Panel>NXT-CV10

AMX NXT-CV10 User Manual

AMX NXT-CV10
208 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #196 background imageLoading...
Page #196 background image
Appendix B - Wireless Technology
184
10" Modero Touch Panels
EAP Authentication
EAP (Extensible Authentication Protocol) is an Enterprise authentication protocol that can be used in both a
wired and wireless network environment. EAP requires the use of an 802.1x Authentication Server, also
known as a Radius server. Although there are currently over 40 different EAP methods defined, the current
internal Modero 802.11g wireless card and accompanying firmware only support the following EAP methods
(listed from simplest to most complex):
EAP-LEAP (Cisco Light EAP)
EAP-FAST (Cisco Flexible Authentication via Secure Tunneling, a.k.a. LEAPv2)
The following use certificates:
EAP-PEAP (Protected EAP)
EAP-TTLS (Tunneled Transport Layer Security)
EAP-TLS (Transport Layer Security)
EAP requires the use of an 802.1x authentication server (also known as a Radius server). Sophisticated Access
Points (such as Cisco) can use a built-in Radius server. The most common RADIUS servers used in wireless
networks today are:
Microsoft Sever 2003
Juniper Odyssey (once called Funk Odyssey)
Meetinghouse AEGIS Server
DeviceScape RADIUS Server
Cisco Secure ACS
EAP characteristics
The following table outlines the differences among the various EAP Methods from most secure (at the top) to
the least secure (at the bottom of the list):
EAP Method Characteristics
Method: Credential Type: Authentication: Pros: Cons:
EAP-TLS Certificates Certificate is based on a
two-way authentication
Highest
Security
Difficult to
deploy
EAP-TTLS Certificates
Fixed Passwords
One-time passwords
(tokens)
Client authentication is
done via password and
certificates
Server authentication is
done via certificates
High Security Moderately
difficult to
deploy
EAP-PEAP Certificates
Fixed Passwords
One-time passwords
(tokens)
Client authentication is
done via password and
certificates
Server authentication is
done via certificates
High Security Moderately
difficult to
deploy
EAP-LEAP Certificates
Fixed Passwords
One-time passwords
(tokens)
Authentication is based on
MS-CHAP and
MS-CHAPv2
authentication protocols
Easy
deployment
Susceptible to
dictionary
attacks
EAP-FAST Certificates
Fixed Passwords
One-time passwords
(tokens)
•N/A •N/A •N/A

Table of Contents

Other manuals for AMX NXT-CV10

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the AMX NXT-CV10 and is the answer not in the manual?

AMX NXT-CV10 Specifications

General IconGeneral
Dimensions (WxDxH)283 x 84 x 202 mm
Ethernet LAN (RJ-45) ports1
Pixel pitch0.28 x 0.28 mm
Aspect ratio16:9
Screen shapeFlat
Display diagonal10 \
Display brightness350 cd/m²
Display resolution800 x 480 pixels
Contrast ratio (typical)350:1
USB Type-A downstream ports quantity2
CertificationFCC 15 B, CE, EN60950
Storage temperature (T-T)-20 - 60 °C
Operating temperature (T-T)0 - 40 °C
Storage relative humidity (H-H)5 - 85 %
Operating relative humidity (H-H)20 - 85 %
NVIDIA G-SYNCNo
Weight and Dimensions IconWeight and Dimensions
Weight (without stand)1200 g

Related product manuals