Implementing 802.1X authentication, which includes everything from setting up a RADIUS server to keeping end users connected, isn't easy. Implementing 802.1X authentication, which includes everything ...
Overview A vulnerability in the RADIUS protocol allows an attacker allows an attacker to forge an authentication response in cases where a Message-Authenticator attribute is not required or enforced.