No video

EAP-VoD.avi

  Рет қаралды 5,060

vybhav ramachandran

vybhav ramachandran

12 жыл бұрын

In this video, we look at EAP, the necessity for it and the different types of EAP.

Пікірлер: 17
@umamaheswarin1146
@umamaheswarin1146 5 жыл бұрын
Excellent content. Very good explanation...
@shravankumar3717
@shravankumar3717 5 жыл бұрын
Awesome content... Please add wireless packet captures if you can, makes it more complete to understand the complete packet structure...
@devij230
@devij230 6 жыл бұрын
wow such a awesome explanation in a detailed manner.its was very boring when i go through the documents in internet. but your way of explanation is very fascinating. keep doing more and more. thanks
@rajesh4647
@rajesh4647 8 жыл бұрын
Superb explanation..... Thanks for sharing such a great knowledge with us...
@paulsiwecki4900
@paulsiwecki4900 9 жыл бұрын
Excellent video, thanks!
@Wajih0309
@Wajih0309 6 жыл бұрын
Excellent Video!
@jagms100
@jagms100 9 жыл бұрын
fantastic. Thanks a ton for the great explanation
@vybhavramachandran
@vybhavramachandran 9 жыл бұрын
Thanks "abc"!
@ryanshayegan
@ryanshayegan 8 жыл бұрын
Awesome Video, Thanks.
@nimshad
@nimshad 11 жыл бұрын
Excellent explanation, Thanks a lot really helped out
@aa002450
@aa002450 10 жыл бұрын
vybhav, superb class. i wish to watch all your videos on authentication. keep it up!
@kittuis4u
@kittuis4u 10 жыл бұрын
Hello Sir!!! Thanks a lot for the session but I have one question about what you are calling Controlled Port and Uncontrolled port... in the flow diagrams that you talk about each of the EAP Procedures PEAP, EAP-TLS etc the diagram says the port is uncontrolled before the EAP authentication and becomes controlled ports after the EAP Authentication... but your speech says otherwise (i.e. you say an controlled port becomes and uncontrolled port) Even in the diagram that you draw at the beginning about the EAP components, you mention that a controlled port before EAP becomes an uncontrolled port after EAP. Could you please confirm which of this is correct?
@asmamubarak1894
@asmamubarak1894 9 жыл бұрын
What resources did you get these information about?
@vybhavramachandran
@vybhavramachandran 9 жыл бұрын
Well, a mixture of sources. RFCs, Cisco docs , whitepapers, etc
@asmamubarak1894
@asmamubarak1894 9 жыл бұрын
What do you mean by whitepapers? cause I'm writing report about it and feel that I don't have enough resources .. regards
@qqlove139
@qqlove139 8 жыл бұрын
Hi, share your PTT ?
EAP_FAST.avi
35:56
vybhav ramachandran
Рет қаралды 7 М.
802.1x and Beyond!
31:46
Black Hat
Рет қаралды 18 М.
路飞太过分了,自己游泳。#海贼王#路飞
00:28
路飞与唐舞桐
Рет қаралды 42 МЛН
Это реально работает?!
00:33
БРУНО
Рет қаралды 4,3 МЛН
Kind Waiter's Gesture to Homeless Boy #shorts
00:32
I migliori trucchetti di Fabiosa
Рет қаралды 4,7 МЛН
If Barbie came to life! 💝
00:37
Meow-some! Reacts
Рет қаралды 51 МЛН
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 337 М.
802.11 Addresses, FROM_DS,TO_DS
28:51
vybhav ramachandran
Рет қаралды 8 М.
The Greenwich Meridian is in the wrong place
25:07
Stand-up Maths
Рет қаралды 719 М.
Risk-Based Authentication Explained
13:37
IBM Technology
Рет қаралды 7 М.
TLS Handshake - EVERYTHING that happens when you visit an HTTPS website
27:59
Practical Networking
Рет қаралды 113 М.
Five Fundamentals of RF You Must Know for WLAN Success
31:31
802.1X EAP Explained with Wireshark
16:07
SDN TechForum
Рет қаралды 2,7 М.
CrowdStrike IT Outage Explained by a Windows Developer
13:40
Dave's Garage
Рет қаралды 2,1 МЛН
路飞太过分了,自己游泳。#海贼王#路飞
00:28
路飞与唐舞桐
Рет қаралды 42 МЛН