Content deleted Content added
m Changing {{cleanup}} to {{cleanup-date|June 2005}} |
-> simplified PEAPv0 section |
||
Line 1:
: ''PEAP is also an acronym for [[Personal Egress Air Packs]].''
{{cleanup-date|June 2005}}
'''Protected Extensible Authentication Protocol''', '''Protected EAP''', or simply '''PEAP''' (pronounced ''"peep"''), is a method to securely transmit [[authentication]] information, including [[password]]s, over [[wireless LAN|wireless network]]s. It was jointly developed by [[Microsoft]], [[RSA Security]] and [[Cisco Systems]]. It is an [[IETF]] [[open standard]]. Note that '''PEAP''' is *not* an encryption protocol; as with other EAP types it only authenticates a client into a network.
PEAP uses only [[server-side]] [[public key certificate]]s to authenticate clients by creating an [[encryption|encrypted]] [[Secure Sockets Layer|SSL]]/[[Transport Layer Security|TLS]] [[tunnel]] between the client and the authentication server, which protects the ensuing exchange of authentication information from casual inspection.
Line 12:
== PEAPv0/EAP-MSCHAPv2 ==
PEAPv0/EAP-MSCHAPv2 is the most common form of PEAP in use, and what is usally referred to as PEAP.
Behind EAP-TLS, PEAPv0/EAP-MSCHAPv2 is the second most widely supported EAP standard in the world. There are client and server implementations of it from various vendors, including support in all recent releases from [[Microsoft]], [[Apple]] and [[Cisco]]. Other implementations exist such as AEGIS from Meetinghouse and xsupplicant from the Open1x.org project.
== PEAPv1/EAP-GTC ==
|