Eap Method

Some articles on eap, eap method:

IEEE 802.1X - Protocol Operation - Typical Authentication Progression
... Initiation To initiate authentication the authenticator will periodically transmit EAP-Request Identity frames to a special Layer 2 address on the local network segment ... by sending an EAPOL-Start frame to the authenticator, which will then reply with an EAP-Request Identity frame ... Negotiation (Technically EAP negotiation) The authentication server sends a reply (encapsulated in a RADIUS Access-Challenge packet) to the authenticator, containing an EAP Request specifying the EAP Method (The type ...
EAP-AKA - Methods - EAP-PSK
... EAP-PSK, defined in RFC 4764, is an EAP method for mutual authentication and session key derivation using a Pre-Shared Key (PSK) ... EAP-PSK is documented in an experimental RFC that provides a lightweight and extensible EAP method that does not require any public-key cryptography ... The EAP method protocol exchange is done in a minimum of four messages ...

Famous quotes containing the word method:

    Letters are above all useful as a means of expressing the ideal self; and no other method of communication is quite so good for this purpose.... In letters we can reform without practice, beg without humiliation, snip and shape embarrassing experiences to the measure of our own desires....
    Elizabeth Hardwick (b. 1916)