ALERT

[FREE DEMO] Deploy Your Enterprise Cloud in Minutes

Protected Extensible Authentication Protocol (PEAP)

Definition - What does Protected Extensible Authentication Protocol (PEAP) mean?

Protected Extensible Authentication Protocol (PEAP) is a protocol that works to provide protections for communication channels in a more fundamental Extensible Authorization Protocol (EAP) method. PEAP is a product of several top tech companies, and has been shipped with major operating systems such as Microsoft Windows XP.

Techopedia explains Protected Extensible Authentication Protocol (PEAP)

Extensible Authentication Protocol is an authentication resource for wireless networks and point-to-point setups. As a general framework, this protocol is useful in many different variations. One of these is Extensible Authentication Protocol Transport Layer Security (EAP-TLS), a protocol that is popular for local area networks.

PEAP provides a transport layer security structure where it is needed within EAP. It uses a public-key encryption certificate for this purpose. Server-side public-key certificates authenticate servers. The use of dedicated keys is part of an elaborate security authentication model for these kinds of network traffic setups. PEAP also involves subtypes for specific security protocols WPA and WPA2.

In general, the use of Protected Extensible Authentication Protocol helps to address security inadequacies in some types of authentication frameworks and prevents different kinds of hacking that may cause problems in 802.11 network traffic. While the methods of all this are fairly inscrutable to the lay audience, the details are important to security professionals who want to make sure that authentication happens in an effective and efficient way.

Techopedia Deals

Connect with us

Techopedia on Linkedin
Techopedia on Linkedin
Tweat cdn.techopedia.com
"Techopedia" on Twitter


'@Techopedia'
Sign up for Techopedia's Free Newsletter!

Email Newsletter

Join thousands of others with our weekly newsletter

Resources
The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.