This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 14 lines
!!! Overview[1]
[{$pagename}] also known as Protected EAP or simply [PEAP], is a [protocol] that encapsulates the [Extensible Authentication Protocol] ([EAP]) within an [encrypted] and [authenticated] [Transport Layer Security] ([TLS]) tunnel.
The purpose was to correct deficiencies in [EAP]; EAP assumed a protected communication channel, such as that provided by physical security, so facilities for protection of the EAP conversation were not provided.
[{$pagename}] was jointly developed by [Cisco Systems], [Microsoft], and [RSA] Security. PEAPv0 was the version included with [Windows XP] and was nominally defined in draft-kamath-pppext-peapv0-00. PEAPv1 and PEAPv2 were defined in different versions of draft-josefsson-pppext-eap-tls-eap. PEAPv1 was defined in draft-josefsson-pppext-eap-tls-eap-00 through draft-josefsson-pppext-eap-tls-eap-05,[6] and PEAPv2 was defined in versions beginning with draft-josefsson-pppext-eap-tls-eap-06.
The protocol only specifies chaining multiple [EAP] mechanisms and not any specific method. However, use of the EAP-MSCHAPv2 and EAP-GTC methods are the most commonly supported
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Protected_Extensible_Authentication_Protocol|Wikipedia:Protected_Extensible_Authentication_Protocol|target='_blank'] - based on information obtained 2017-05-25-