icos-3----Page:3
1  2  3  4  5  6  7  8 

EAP Usage Scenarios
EAP parties: EAP peer, EAP server/AAA server, authenticator
Basic scenarios
Peer and authenticator speak some other protocol, authenticator and AAA server speak AAA protocol
This is basic AAA usage (prior to EAP)
Peer and authenticator speak EAP; authenticator and EAP server/AAA server speak EAP over AAA
This is the basic EAP/AAA scenario (e.g. 802.11i)
Peer and authenticator speak some other protocol, but use keys derived from a previous EAP conversation between the same EAP peer and EAP server
This is a new application not yet defined.


PPT Version