EAP-TLS authentication uses certificates for authentication. A third-party Certificate Authentication application is required to configure EAP-TLS authentication. Certificates can be overwritten with new ones at any time.
With EAP-TLS authentication, the controller can operate in the following modes:
Note
When a wireless AP that is configured with 802.1x EAP-TLS authentication is connected to a controller, the AP begins submitting logs to the controller thirty days before the certificate expires to provide administrators with a warning of the impending expiry date.