I work for a network test equipment developer and have to test devices with multiple security types by multiple security device vendors. Most all enterprise security uses 802.1x whether wired or wireless. To many, 802.1x can be confusing at best, and mind-blowing at its worst. Edwin Brown's book
802.1X Port-Based Authentication
β Scribed by Edwin Lyle Brown
- Year
- 2006
- Tongue
- English
- Leaves
- 244
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Port-based authentication is a βnetwork access controlβ concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to todayβs computer networks using this particular network protocol.
π SIMILAR VOLUMES
I work for a network test equipment developer and have to test devices with multiple security types by multiple security device vendors. Most all enterprise security uses 802.1x whether wired or wireless. To many, 802.1x can be confusing at best, and mind-blowing at its worst. Edwin Brown's book
Port-based authentication is a βnetwork access controlβ concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. <b>802.1X Port-Based Authentication </b>examines how this concept can be applied and the effects of its applicati
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior