E-Book, Englisch, 256 Seiten
Brown 802.1X Port-Based Authentication
Erscheinungsjahr 2006
ISBN: 978-1-4200-4465-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 256 Seiten
ISBN: 978-1-4200-4465-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today’s computer networks using this particular network protocol.
Zielgruppe
Electrical and electronics engineers; network engineers and managers.
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Overview
What Is 802.1X and Why Should I Care?
The History and Technical Documents
How Does It Work?
Technical Discussion
EAPOL, EAP and EAP Methods
Radius
Management
Security Concerns
Configuring 802.IX
Wireless
Design, Implementation and Troubleshooting
Design
A Very Simple Network
What If It Didn’t Work Right?
Guests
What Do I Do With My Printers and Servers?
Unplanned Expansion
Expand to Wireless
IP Telephony
A Not So Simple Network
Design Recap
Index




