Port-based authentication is a "network access control" concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today's computer networks using this particular network protocol.
This text assumes that the reader may have little or no prior knowledge and only a general understanding of computer networking, presenting an introductory overview as well as a subject overview in each chapter.
The NAC lifecycle — learn the steps of assessing, evaluating, remediating, enforcing, and monitoring your program Which one's for you? — decide on the best NAC approach for your organization AAA is not the auto club — understand the ...
- This guide will help you determine what type of solution makes the most sense, based upon the most prevalent risks in your environment."--Jacket.
Here is a road map that will steer you safely around the pitfalls, smooth out the rough patches, and guide you to a successful implementation of 802.1x in both wired and wireless networks.
XAUTH requires the disclosure of iden- tity early in the IPsec handshake, and must run in the security-diminishing “aggres- sive” mode. The security of the handshake and the resulting tunnel to pass user credentials depends on a shared ...
This isn’t a book on packet theory. Author Bruce Hartpence built topologies in a lab as he wrote this guide, and each chapter includes several packet captures.
Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks.
When devices on enterprise LANs need to connect to other devices, they need a standard method for identifying each other to ensure they are communicating with the device they want to, and that's what 802.1x does. 802.1X can be a complex ...
If you’re looking for a truly comprehensive guide to network security, this is the one! ” –Steve Gordon, Vice President, Technical Services, Cisco Yusuf Bhaiji, CCIE No. 9305 (R&S and Security), has been with Cisco for seven years and ...
Wireless Operational Security bridges this gap. *Presents a new "WISDOM" model for Wireless Security Infrastructures *Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations ...