Limit search to available items
Record 4 of 736
Previous Record Next Record
Book Cover
E-book
Author Brown, Edwin Lyle.

Title 802.1X port-based authentication / Edwin Lyle Brown
Published Boca Raton : Auerbach, ©2007

Copies

Description 1 online resource (238 pages) : illustrations
Contents Cover -- TOC36;Contents -- CH36;1 Overview -- 146;1 What Is 80246;1X and Why Should I Care63; -- 146;2 The History and Technical Documents -- 146;3 How Does It Work63; -- CH36;2 Technical Discussion -- 246;1 EAPOL44; EAP44; and EAP45;Methods -- 246;2 Radius -- 246;3 Management -- 246;4 Security Concerns -- 246;5 Configuring 80246;1X -- 246;6 Wireless -- CH36;3 Design44; Implementation44; and Troubleshooting -- 346;1 Design -- 346;2 A Very Simple Network -- 346;3 What If It Didnt Work Right63; -- 346;4 Guests -- 346;5 What Do I Do With My Printers and Servers63; -- 346;6 Unplanned Expansion -- 346;7 Expanding to Wireless -- 346;8 IP Telephony -- 346;9 A Not So Simple Network -- 346;10 Design Recap -- IDX36;Index -- Last Page
Summary Port-based authentication is a "network access control" concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. "802.1X Port-Based Authentication" examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment.; Each chapter contains a subject overview. Incorporating theoretical and practical approaches, "802.1X Port-Based Authentication" seeks to define this complex concept in accessible terms. It explores various applications to today's computer networks using this particular network protocol
Notes Includes index
Bibliography Includes bibliographical references and index
Notes English
Print version record
Subject Computer networks -- Security measures -- Standards
Computers -- Access control -- Standards
Computer network protocols.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer network protocols
Computer networks -- Security measures -- Standards
Computers -- Access control -- Standards
Form Electronic book
LC no. 2006030999
ISBN 1420044648
9781420044645
9781420044652
1420044656
0429117302
9780429117305
1281075817
9781281075819
9786611075811
661107581X