
Access Control Concepts
Network Access Control Technologies
In the first
The secondary protocol can be another EAP method, but is typically a form of the RADIUS CHAP/PAP protocols (see “RADIUS” on page
The encryption tunnel is maintained only for the duration of the secondary handshake; once the handshake is complete, the tunnel is destroyed.
Protected EAP (PEAP). PEAP is Microsoft’s extension of
Unlike