October 2002
Intermediate to advanced
206 pages
8h 30m
English
EAP has a lot of potential, although its current uses are limited since most of the protocols it uses to talk with a backend security authenticator are proprietary, largely due to a lack of standardization. However, RADIUS over EAP compensates for some of the security deficiencies of the core RADIUS protocol’s design, as discussed at length in Chapter 8, and is recommended for use where appropriate.