<P> EAP is an authentication framework, not a specific authentication mechanism . It provides some common functions and negotiation of authentication methods called EAP methods . There are currently about 40 different methods defined . Methods defined in IETF RFCs include EAP - MD5, EAP - POTP, EAP - GTC, EAP - TLS, EAP - IKEv2, EAP - SIM, EAP - AKA and EAP - AKA' . Additionally a number of vendor - specific methods and new proposals exist . Commonly used modern methods capable of operating in wireless networks include EAP - TLS, EAP - SIM, EAP - AKA, LEAP and EAP - TTLS . Requirements for EAP methods used in wireless LAN authentication are described in RFC 4017 . The list of type and packets codes used in EAP is available from the IANA EAP Registry . </P> <P> The standard also describes the conditions under which the AAA key management requirements described in RFC 4962 can be satisfied . </P> <P> The Lightweight Extensible Authentication Protocol (LEAP) method was developed by Cisco Systems prior to the IEEE ratification of the 802.11 i security standard . Cisco distributed the protocol through the CCX (Cisco Certified Extensions) as part of getting 802.1 X and dynamic WEP adoption into the industry in the absence of a standard . There is no native support for LEAP in any Windows operating system, but it is widely supported by third party client software most commonly included with WLAN (wireless LAN) devices . LEAP support for Microsoft Windows 7 and Microsoft Windows Vista can be added by downloading a client add in from Cisco that provides support for both LEAP and EAP - FAST . Due to the wide adoption of LEAP in the networking industry many other WLAN vendors claim support for LEAP . </P> <P> LEAP uses a modified version of MS - CHAP, an authentication protocol in which user credentials are not strongly protected and easily compromised; an exploit tool called ASLEAP was released in early 2004 by Joshua Wright . Cisco recommends that customers who absolutely must use LEAP do so only with sufficiently complex passwords, though complex passwords are difficult to administer and enforce . Cisco's current recommendation is to use newer and stronger EAP protocols such as EAP - FAST, PEAP, or EAP - TLS . </P>

What is the acronym for the protocol suite to which eap belongs