Posted on 2004-10-26
Last Modified: 2010-04-10
Please can anyone describe for me what is a EAP and where and in which way it is useful.

Please don`t mention the definition used in Webopedia. I studied it but didn`t got the exact point. Please describe it in detial.

thanks in advance.
Question by:dineshb_2001
    LVL 2

    Assisted Solution

    LVL 3

    Accepted Solution


    EAP is used in computer security and it is a
    "protocol" or a standard for authenticating a
    user (in other words making sure the user
    is who he says he is), much like you "authenticate"
    when you log in to windows. The difference
    between EAP (which stands for Extensible
    Authentication Protocol by the way) and any
    other protocol is that EAP is meant to work
    for a lot of things and is not meant to
    be proprietary, or owned by one company.

    Hope this clears things up,


    Fadi Ramada,
    Network+, Security+

    Author Comment

    Hi fadiramada,

     It`s me once again. Please I am in hurry. Please let me know the way to find out the HomeAgent. Atleast you give me steps to find it out. I am tensed as I have to submit the presentation on this tuesday to show the way for finding the HA.  

    Please Please Please Fadi.  Help me out.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    In every aspect, security is essential for your business, and for that matter you need to always keep an eye on it. The same can be said about your computer network system too. Your computer network is prone to various malware and security threats t…
    If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

    856 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    21 Experts available now in Live!

    Get 1:1 Help Now