Browse Prior Art Database

Extensible Authentication Protocol (EAP) Method Requirements for Wireless LANs (RFC4017)

IP.com Disclosure Number: IPCOM000110166D
Original Publication Date: 2005-Mar-01
Included in the Prior Art Database: 2005-Mar-25
Document File: 12 page(s) / 22K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

D. Stanley: AUTHOR [+3]

Abstract

The IEEE 802.11i MAC Security Enhancements Amendment makes use of IEEE 802.1X, which in turn relies on the Extensible Authentication Protocol (EAP). This document defines requirements for EAP methods used in IEEE 802.11 wireless LAN deployments. The material in this document has been approved by IEEE 802.11 and is being presented as an IETF RFC for informational purposes.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 12% of the total text.

Network Working Group                                         D. Stanley
Request for Comments: 4017                                 Agere Systems
Category: Informational                                        J. Walker
                                                       Intel Corporation
                                                                B. Aboba
                                                   Microsoft Corporation
                                                              March 2005


      Extensible Authentication Protocol (EAP) Method Requirements
                           for Wireless LANs

Status of this Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (C) The Internet Society (2005).

Abstract

   The IEEE 802.11i MAC Security Enhancements Amendment makes use of
   IEEE 802.1X, which in turn relies on the Extensible Authentication
   Protocol (EAP).  This document defines requirements for EAP methods
   used in IEEE 802.11 wireless LAN deployments.  The material in this
   document has been approved by IEEE 802.11 and is being presented as
   an IETF RFC for informational purposes.

Table of Contents

   1.  Introduction .................................................  2
       1.1.  Requirements Specification .............................  2
       1.2.  Terminology ............................................  2
   2.  Method Requirements ..........................................  3
       2.1.  Credential Types .......................................  3
       2.2.  Mandatory Requirements .................................  4
       2.3.  Recommended Requirements ...............................  5
       2.4.  Optional Features ......................................  5
       2.5.  Non-compliant EAP Authentication Methods ...............  5
   3.  Security Considerations ......................................  6
   4.  References ...................................................  8
   Acknowledgments ..................................................  9
   Authors' Addresses ............................................... 10
   Full Copyright Statement ......................................... 11


Stanley, et al.              Informational                      [Page 1]
RFC 4017       EAP Method Requirements for Wireless LANs      March 2005


1.  Introduction

...