Fact-checked by Grok 2 weeks ago
References
-
[1]
RFC 3748 - Extensible Authentication Protocol (EAP)This document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.
-
[2]
RFC 2284 - PPP Extensible Authentication Protocol (EAP)This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements.
-
[3]
Extensible Authentication Protocol (EAP) RegistryApr 9, 2004 · Extensible Authentication Protocol (EAP) Registry · Packet Codes · EAP Initiate and Finish Attributes · Method Types · EAP-FAST TLV Types (Value 43).
-
[4]
RFC 9190: EAP-TLS 1.3: Using the Extensible Authentication ...The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods.Table of Contents · Introduction · Protocol Overview · Security Considerations
-
[5]
Extensible Authentication Protocol (EAP) for network accessJul 9, 2025 · This article presents information about the Extensible Authentication Protocol (EAP) settings and configuration in Windows-based computers.Security Settings · Server Certificate... · Wpa3-Enterprise 192-Bit Mode
-
[6]
How to Configure VPN Access Control Using 802.1X AuthenticationThe VPN Access Control Using 802.1X Authentication feature allows enterprise employees to access their enterprise networks from homeMissing: VPNs | Show results with:VPNs
-
[7]
RFC 9048 - Improved Extensible Authentication Protocol Method for ...Sep 24, 2024 · The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks.
-
[8]
Configure AnyConnect Flexvpn with EAP and DUO AuthenticationJun 26, 2023 · This document describes how to configure external two-factor authentication for AnyConnect IPSec connection to a Cisco IOS® XE router.
-
[9]
EAP-based Authentication Service for CoAP - IETFJul 26, 2021 · This document specifies an authentication service that uses the Extensible Authentication Protocol (EAP) transported employing Constrained ...Missing: PPP port-
-
[10]
RFC 3579 - RADIUS (Remote Authentication Dial In User Service ...This document defines Remote Authentication Dial In User Service (RADIUS) support for the Extensible Authentication Protocol (EAP), an authentication framework
-
[11]
EAP Authentication with RADIUS Server - CiscoOct 19, 2009 · This document provides a sample configuration of a Cisco IOS® based access point for Extensible Authentication Protocol (EAP) authentication of wireless users
-
[12]
Information on RFC 2284 - » RFC EditorRFC 2284. PPP Extensible Authentication Protocol (EAP), March 1998. File formats: icon for text file icon ... Publication Queue · Style Guide · Advanced Search.
-
[13]
Information on RFC 3748 - » RFC EditorThis document defines the Extensible Authentication Protocol (EAP), an authentication framework which supports multiple authentication methods.
-
[14]
Information on RFC 5247 » RFC Editor- **Publication Date:** August 2008
-
[15]
Information on RFC 7057 - » RFC EditorThis document updates the Extensible Authentication Protocol (EAP) applicability statement from RFC 3748 to reflect recent usage of the EAP protocol.
-
[16]
Extensible Authentication Protocol (EAP) in next-generation networksApr 6, 2022 · EAP is an authentication framework used by networks for authenticating devices (the EAP peers) before they are authorized to access the internet ...
-
[17]
RFC 5216 - The EAP-TLS Authentication Protocol - IETF DatatrackerThis document defines EAP-TLS, which includes support for certificate-based mutual authentication and key derivation.
-
[18]
RFC 5281 - Extensible Authentication Protocol Tunneled Transport ...1. EAP When EAP is the tunneled authentication protocol, each tunneled EAP packet between the client and TTLS server is encapsulated in an EAP- Message AVP, ...
-
[19]
RFC 7170 - Tunnel Extensible Authentication Protocol (TEAP ...TEAP is a tunnel-based EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) protocol.
-
[20]
RFC 5247 - Extensible Authentication Protocol (EAP) Key ...This document specifies the EAP key hierarchy and provides a framework for the transport and usage of keying material and parameters generated by EAP ...
- [21]
- [22]
- [23]
- [24]
- [25]
- [26]
- [27]
- [28]
- [29]
- [30]
- [31]
- [32]
- [33]
- [34]
- [35]
- [36]
- [37]
-
[38]
RFC 6678 - Requirements for a Tunnel-Based Extensible ...1. Method Negotiation The tunnel method MUST support the protected negotiation of the inner EAP method. · 2. Chained Methods The tunnel method SHOULD support the ...<|separator|>
-
[39]
[MS-PEAP]: Overview - Microsoft LearnSep 29, 2025 · EAP enables extensible authentication for network access. EAP methods operate within the EAP framework to provide support for a variety of authentication ...
-
[40]
RFC 4851 - The Flexible Authentication via Secure Tunneling ...EAP-FAST is an EAP method that enables secure communication between a peer and a server by using the Transport Layer Security (TLS) to establish a mutually ...
-
[41]
RFC 4764 - The EAP-PSK Protocol: A Pre-Shared Key Extensible ...This document specifies EAP-PSK, an Extensible Authentication Protocol (EAP) method for mutual authentication and session key derivation using a Pre-Shared Key ...
-
[42]
RFC 5931 - Extensible Authentication Protocol ... - IETF DatatrackerThis memo describes an Extensible Authentication Protocol (EAP) method, EAP-pwd, which uses a shared password for authentication.
-
[43]
RFC 4793 - The EAP Protected One-Time Password Protocol (EAP ...This document describes a general Extensible Authentication Protocol (EAP) method suitable for use with One-Time Password (OTP) tokens.
-
[44]
RFC 4186 - Extensible Authentication Protocol Method for Global ...This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution using the Global System for ...
-
[45]
RFC 4187 - Extensible Authentication Protocol Method for 3rd ...This document specifies an Extensible Authentication Protocol (EAP) mechanism for authentication and session key distribution that uses the Authentication and ...
-
[46]
RFC 5448: Improved Extensible Authentication Protocol Method for 3rd Generation Authentication and Key Agreement (EAP-AKA')### Summary of RFC 5448 - EAP-AKA'
-
[47]
RFC 9048 - Improved Extensible Authentication Protocol Method for ...The 3GPP mobile network Authentication and Key Agreement (AKA) is an authentication mechanism for devices wishing to access mobile networks.Missing: 6G | Show results with:6G
-
[48]
[PDF] ETSI TS 133 401 V18.3.0 (2025-04)The present document may refer to technical specifications or reports using their 3GPP identities. These shall be interpreted as being references to the ...
-
[49]
[PDF] TS 133 501 - V15.9.0 - 5G - ETSIUE and serving network shall support EAP-AKA' and 5G AKA authentication methods. ... EAP-AKA' and 5G AKA for non-3GPP access networks shall reside on the ...
-
[50]
Cisco LEAPJun 22, 2009 · Cisco LEAP is an 802.1X authentication type for Wireless LANs (WLANs) that supports strong mutual authentication between the client and a RADIUS server.Missing: documentation | Show results with:documentation
-
[51]
Cisco Lightweight Extensible Authentication Protocol (LEAP) uses ...Oct 30, 2003 · The Cisco LEAP protocol is vulnerable to dictionary attacks against users' passwords. Using readily available software, weak passwords can be ...
-
[52]
Extensible Authentication Protocols - CiscoJun 30, 2022 · EAP-GTC. EAP-GTC, defined in RFC 2284, is a simple method for transmitting a user's name and password to an authentication server. EAP-GTC ...
-
[53]
IEEE 802.1X-2020Feb 28, 2020 · 802.1X-2010; Board Approval: 2020-01-30; History. Published: 2020-02-28. Working Group Details. Society: IEEE Computer Society; Standard ...
-
[54]
RFC 3580 - IEEE 802.1X Remote Authentication Dial In User ...For example, within 802.11 the RC4 EAPOL-Key frame can be used to distribute multicast/broadcast ("default") keys, or unicast ("key mapping") keys. The ...
-
[55]
[PDF] 18-452/18-750 Wireless Networks and Applications - Lecture 11: WiFi» Campus networks: SSID corresponds to multiple APs. • Security considerations ... • IEEE 802.1x supports authenticated and encrypted access to IEEE 802 ...
-
[56]
RFC 5191 - Protocol for Carrying Authentication for Network Access ...This document defines the Protocol for Carrying Authentication for Network Access (PANA), a network-layer transport for Extensible Authentication Protocol (EAP)
-
[57]
RFC 2869 - RADIUS Extensions - IETF Datatracker1. Separation of EAP server and PPP authenticator It is possible for the EAP endpoints to mutually authenticate, negotiate a ciphersuite, and derive a session ...
- [58]
-
[59]
RFC 4072 - Diameter Extensible Authentication Protocol (EAP ...This document defines the Command-Codes and AVPs necessary to carry EAP packets between a Network Access Server (NAS) and a back-end authentication server.
- [60]
- [61]
- [62]
- [63]
- [64]
- [65]
- [66]
-
[67]
RFC 3748: Extensible Authentication Protocol (EAP)Summary of each segment:
- [68]
- [69]
- [70]
- [71]
-
[72]
Post-Quantum Enhancements to EAP-TLS and EAP-TTLS - IETFJul 7, 2025 · This document proposes enhancements to the Extensible Authentication Protocol with Transport Layer Security (EAP-TLS) and EAP Tunneled TLS ...
-
[73]
Enhancing Security in EAP-AKA' with Hybrid Post-Quantum ... - IETFMar 16, 2025 · Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography · 1. Introduction · 2. Conventions and Definitions · 3. Terminology · 4.
-
[74]
Linux WPA/WPA2/WPA3/IEEE 802.1X SupplicantJan 12, 2013 · wpa_supplicant is a WPA Supplicant for Linux, BSD, Mac OS X, and Windows with support for WPA, WPA2 (IEEE 802.11i / RSN), and WPA3.
-
[75]
Dynamic WEP, WPA Enterprise, and WPA2 ... - Apple SupportOct 24, 2022 · Available EAP protocols. Select an Extensible Authentication Protocol (EAP) type to use for 802.1X network authentication: TLS · TTLS · PEAP.Missing: WLAN 3GPP
-
[76]
EAP :: The FreeRADIUS project - DocumentationEAP-TLS, defined in RFC 2716, is an IETF open standard, and is well-supported among wireless vendors. It offers a good deal of security, since TLS is considered ...
-
[77]
EAP-TLS: Certificate-based authentication - FreeRADIUSEAP-TLS: Certificate-based authentication. Goal: To configure the server to use the EAP-TLS authentication protocol and to send and receive test packets.
-
[78]
Learn about Features Supported by Intel® Wi-Fi AdaptersLearn about Features Supported by Intel® Wi-Fi Adapters ; Authentication4, WPA and WPA2, 802.1X (EAP-TLS, TTLS, PEAP, LEAP, EAP-FAST), EAP-SIM, EAP-AKA, WPA and ...
-
[79]
[PDF] On the use of EAP/SIM in 3G-WLAN-interworking - 3GPPEAP-SIM is the current working assumption in 3GPP to provide authentication and key management in the 3G-WLAN interworking system for users equipped with a SIM ...
-
[80]
RFC 9678 - Forward Secrecy Extension to the ... - IETF DatatrackerThe extension EAP-AKA' Forward Secrecy (EAP-AKA' FS), when negotiated, provides forward secrecy for the session keys generated as a part of the authentication ...
-
[81]
RFC 9820 - Authentication Service Based on the Extensible ...Sep 12, 2025 · Authentication Service Based on the Extensible Authentication Protocol (EAP) for Use with the Constrained Application Protocol (CoAP) RFC 9820.
-
[82]
draft-ietf-emu-hybrid-pqc-eapaka-00 - Enhancing Security in EAP ...Jul 22, 2025 · Enhancing Security in EAP-AKA' with Hybrid Post-Quantum Cryptography draft-ietf-emu-hybrid-pqc-eapaka-00 ; Internet Engineering Task Force (IETF).Missing: refresh | Show results with:refresh
-
[83]
EAP Method Update (emu)### Summary of Recent Activity on EAP Base Spec Refresh (2022 Onward)
-
[84]
Zero Trust: User and Device Security Design Guide - CiscoWithin the Zero Trust: Network and Cloud Security Design Guide, EAP-FAST is configured to authenticate and authorize both the user and their machine before ...