Page 864 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 864
Access Controller Access Control System Plus (TACACS+).
EAP, PEAP, and LEAP
Protected Extensible Authentication Protocol (PEAP) encapsulates
EAP in a TLS tunnel. PEAP is preferred to EAP because EAP
assumes that the channel is already protected but PEAP imposes
its own security. PEAP is used for securing communications over
802.11 wireless connections. PEAP can be employed by Wi-Fi
Protected Access (WPA) and WPA-2 connections.
PEAP is also preferred over Cisco’s proprietary EAP known as
Lightweight Extensible Authentication Protocol (LEAP). LEAP
was Cisco’s initial response to insecure WEP. LEAP supported
frequent reauthentication and changing of WEP keys (whereas
WEP used single authentication and a static key). However, LEAP
is crackable using a variety of tools and techniques, including the
exploit tool Asleap.

