8 Index

A

Abstract data model

   peer (section 3.1.1, section 3.2.1)

   server (section 3.1.1, section 3.3.1)

Applicability

C

Capabilities_Method_Request packet

Capabilities_Method_Response packet

Capabilities_Negotiation_Method packet

Capability negotiation

Change tracking

client_hello packet

Cryptobinding

   SoH processing

      no support

         overview example

      server and peer

         overview example

      server only

         overview example

   TLV data

      request from server to client

         compound MAC example

         nonce example

         overview example

      response from client to server

         compound MAC example

         nonce example

         overview example

Cryptobinding and SoH processing

   no support

      successful PEAP

         Phase 1 and 2 negotiation example

         Phase 1 with failed Phase 2 negotiation example

         Phase 1 with fast reconnect example

   PEAP server and PEAP peer

      fallback to full authentication upon fast reconnect failure example

      successful PEAP

         Phase 1 and 2 negotiation example

         Phase 1 with fast reconnect example

   PEAP server only

      successful PEAP -  Phase 1 and 2 negotiation example

      successful PEAP - Phase 1 and 2 negotiation example

Cryptobinding_TLV packet

D

Data model - abstract

   peer (section 3.1.1, section 3.2.1)

   server (section 3.1.1, section 3.3.1)

E

EAP Expanded Types message

EAP Extensions method

EAP Extensions Methods message

EAP Packet message

EAP_Expanded_Type packet

EAP_Packet packet

EAP_TLV_Extensions_Method packet

Examples

   cryptobinding

      SoH processing

         no support

            overview

         server and peer

            overview

         server only

            overview

      TLV data

         request from server to client

            compound MAC

            nonce

            overview

         response from client to server

            compound MAC

            nonce

            overview

   cryptobinding and SoH processing

      no support

         successful PEAP

            Phase 1 and 2 negotiation

            Phase 1 with failed Phase 2 negotiation

            Phase 1 with fast reconnect

      PEAP server and PEAP peer

         fallback to full authentication upon fast reconnect failure

         successful PEAP

            Phase 1 and 2 negotiation

            Phase 1 with fast reconnect

      PEAP server only

         successful PEAP - Phase 1 and 2 negotiation

   overview

F

Fields - vendor-extensible

G

Glossary

H

Higher-layer triggered events

   peer

      overview

   server

      overview

I

Implementer - security considerations

   authentication outcomes

   fast reconnect

   identity verification

Index of security parameters

Informative references

Initialization

   peer (section 3.1.3, section 3.2.3)

   server (section 3.1.3, section 3.3.3)

Introduction

L

Local events

   peer

      interface with

         EAP (section 3.1.7.2, section 3.2.7.3)

         TLS

      overview (section 3.1.7, section 3.2.7)

      TLS session

         established successfully

         failed to establish

   server

      EAP inner method authentication

         failed

         success

      interface with

         EAP

         TLS

      overview

      TLS session

         established successfully

         failed to establish

M

Message processing

   peer

      cryptobinding

      error handling (section 3.1.5.1, section 3.2.5.1)

      key management (section 3.1.5.7, section 3.2.5.5)

      packet processing

      PEAP packet processing

      PEAP peer cryptobinding validation

      phase 1 - TLS tunnel establishment (section 3.1.5.4, section 3.2.5.2)

      phase 2 - EAP encapsulation

      status (section 3.1.5.1, section 3.2.5.1)

      version negotiation

   server

      cryptobinding

      error handling (section 3.1.5.1, section 3.3.5.1)

      key management (section 3.1.5.7, section 3.3.5.5)

      packet processing

      PEAP packet processing

      PEAP server cryptobinding validation

      phase 1 - TLS tunnel establishment (section 3.1.5.4, section 3.3.5.2)

      phase 2 - EAP encapsulation

      status (section 3.1.5.1, section 3.3.5.1)

      version negotiation

Messages

   EAP Expanded Types

   EAP Extensions method

   EAP Extensions Methods

   EAP Packet

   Outer TLVs

   overview

   PEAP Fragment Acknowledgement Packet

   PEAP Packet

   TLV

   transport

   Vendor-Specific TLV

N

Normative references

O

Outer TLVs

Outer TLVs message

Overview (synopsis)

P

Parameters - security index

PEAP Fragment Acknowledgement packet

PEAP Fragment Acknowledgement Packet message

PEAP Packet message

PEAP_Packet packet

peap_start packet

Peer

   abstract data model (section 3.1.1, section 3.2.1)

   higher-layer triggered events

      overview

   initialization (section 3.1.3, section 3.2.3)

   local events

      interface with

         EAP (section 3.1.7.2, section 3.2.7.3)

         TLS

      overview (section 3.1.7, section 3.2.7)

      TLS session

         established successfully

         failed to establish

   message processing

      cryptobinding

      error handling (section 3.1.5.1, section 3.2.5.1)

      key management (section 3.1.5.7, section 3.2.5.5)

      packet processing

      PEAP packet processing

      PEAP peer cryptobinding validation

      phase 1 - TLS tunnel establishment (section 3.1.5.4, section 3.2.5.2)

      phase 2 - EAP encapsulation

      status (section 3.1.5.1, section 3.2.5.1)

      version negotiation

   overview (section 3, section 3.1)

   sequencing rules

      cryptobinding

      error handling (section 3.1.5.1, section 3.2.5.1)

      key management (section 3.1.5.7, section 3.2.5.5)

      packet processing

      PEAP packet processing

      PEAP peer cryptobinding validation

      phase 1 - TLS tunnel establishment (section 3.1.5.4, section 3.2.5.2)

      phase 2 - EAP encapsulation

      status (section 3.1.5.1, section 3.2.5.1)

      version negotiation

   timer events (section 3.1.6, section 3.2.6)

   timers (section 3.1.2, section 3.2.2)

Preconditions

Prerequisites

Product behavior

Protocol Details

   overview

R

References

   informative

   normative

Relationship to other protocols

Result_TLV packet

S

Security

   implementer considerations

      authentication outcomes

      fast reconnect

      identity verification

   overview

   parameter index

   parameters index

Sequencing rules

   peer

      cryptobinding

      error handling (section 3.1.5.1, section 3.2.5.1)

      key management (section 3.1.5.7, section 3.2.5.5)

      packet processing

      PEAP packet processing

      PEAP peer cryptobinding validation

      phase 1 - TLS tunnel establishment (section 3.1.5.4, section 3.2.5.2)

      phase 2 - EAP encapsulation

      status (section 3.1.5.1, section 3.2.5.1)

      version negotiation

   server

      cryptobinding

      error handling (section 3.1.5.1, section 3.3.5.1)

      key management (section 3.1.5.7, section 3.3.5.5)

      packet processing

      PEAP packet processing

      PEAP server cryptobinding validation

      phase 1 - TLS tunnel establishment (section 3.1.5.4, section 3.3.5.2)

      phase 2 - EAP encapsulation

      status (section 3.1.5.1, section 3.3.5.1)

      version negotiation

Server

   abstract data model (section 3.1.1, section 3.3.1)

   higher-layer triggered events

      overview

   initialization (section 3.1.3, section 3.3.3)

   local events

      EAP inner method authentication

         failed

         success

      interface with

         EAP

         TLS

      overview

      TLS session

         established successfully

         failed to establish

   message processing

      cryptobinding

      error handling (section 3.1.5.1, section 3.3.5.1)

      key management (section 3.1.5.7, section 3.3.5.5)

      packet processing

      PEAP packet processing

      PEAP server cryptobinding validation

      phase 1 - TLS tunnel establishment (section 3.1.5.4, section 3.3.5.2)

      phase 2 - EAP encapsulation

      status (section 3.1.5.1, section 3.3.5.1)

      version negotiation

   overview (section 3, section 3.1)

   sequencing rules

      cryptobinding

      error handling (section 3.1.5.1, section 3.3.5.1)

      key management (section 3.1.5.7, section 3.3.5.5)

      packet processing

      PEAP packet processing

      PEAP server cryptobinding validation

      phase 1 - TLS tunnel establishment (section 3.1.5.4, section 3.3.5.2)

      phase 2 - EAP encapsulation

      status (section 3.1.5.1, section 3.3.5.1)

      version negotiation

   timer events (section 3.1.6, section 3.3.6)

   timers (section 3.1.2, section 3.3.2)

SoH_EAP_Extensions_Method packet

SoH_Request_TLV packet

SoH_Response_TLV packet

SoH_TLV packet

Standards assignments

T

Timer events

   peer (section 3.1.6, section 3.2.6)

   server (section 3.1.6, section 3.3.6)

Timers

   peer (section 3.1.2, section 3.2.2)

   server (section 3.1.2, section 3.3.2)

TLV message

TLV packet

Tracking changes

Transport

Triggered events - higher-layer

   peer

      overview

   server

      overview

V

Vendor_Specific_TLV packet

Vendor-extensible fields

Vendor-Specific TLV message

Versioning

Show: