@techreport{abhi-eap-radius-00, number = {draft-abhi-eap-radius-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-abhi-eap-radius/00/}, author = {Abhishek Singh}, title = {{Secure Communication of EAP - Radius messages}}, pagetotal = 5, year = 2008, month = feb, day = 13, abstract = {EAP is used to establish secure communication channel in IKEv2 and in Wireless Security. EAP-TLS, EAP-TTLS, EAP-MD5, EAP-SIM uses radius protocol for communication bewteen radius server and the client. These protocols are used in both Wireless network authentication and in IKEV2 authentication to establish VPN tunnel. +----------+ +----------+ +----------+ \textbar{} \textbar{} EAPOL \textbar{} EAP \textbar{} RADIUS \textbar{} \textbar{} \textbar{} EAP \textbar{}\textless{}------\textgreater{}\textbar{} Server \textbar{}\textless{}------\textgreater{}\textbar{} RADIUS \textbar{} \textbar{} Client \textbar{} EAPOW \textbar{} \textbar{} (EAP) \textbar{} Server \textbar{} \textbar{} \textbar{} \textbar{} \textbar{} \textbar{} \textbar{} +----------+ +----------+ +----------+ This draft presents the security protocol which can be used to establish the secure communication channel between the radius server and pass through server. Pass through server is access point in the case of wireless communication and it is gateway in case of IKEV2 authnetication.}, }