PPP Fortezza Encryption Encapsulation Protocol
draft-ietf-pppext-feep-01
Document | Type | Expired Internet-Draft (pppext WG) | |
---|---|---|---|
Authors | James Zmuda , William Nace | ||
Last updated | 1997-12-03 | ||
Stream | IETF | ||
Intended RFC status | (None) | ||
Formats |
Expired & archived
pdf
htmlized (tools)
htmlized
bibtex
|
||
Stream | WG state | WG Document | |
Document shepherd | No shepherd assigned | ||
IESG | IESG state | Expired | |
Consensus Boilerplate | Unknown | ||
Telechat date | |||
Responsible AD | (None) | ||
Send notices to | (None) |
https://www.ietf.org/archive/id/draft-ietf-pppext-feep-01.txt
Abstract
The Point-to-Point Protocol (PPP) [1] provides a standard method for transporting multi-protocol datagrams over point-to-point links PPP also defines an extensible Link Control Protocol, which allows negotiation of an Authentication Protocol for authentication of its peer before allowing Network Layer protocols to transmit over the link. One of the Authentication protocols that can be negotiated is the EAP. The EAP can be used in any of a number of variants. When the EAP is used in it's KEA variant, this results in mutual authentication and key generation. This key is available for use during the PPP data transfer phase by an encryption encapsulation. The encryption encapsulation that is described in this memo is one possible encapsulation that can use the keying material generated by the EAP KEA protocol.
Authors
James Zmuda
(jzmuda@spyrus.com)
William Nace
(wanace@missi.ncsc.mil)
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)