E-Book, Englisch, 330 Seiten, E-Book
Geier Implementing 802.1X Security Solutions for Wired and Wireless Networks
1. Auflage 2008
ISBN: 978-0-470-37028-5
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
E-Book, Englisch, 330 Seiten, E-Book
ISBN: 978-0-470-37028-5
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
You know it?s essential, and you've heard that it can be tricky ?implementing the 802.1x standard. Here is a road map that willenable you to approach 802.1x implementation with confidence sothat you can conduct successful implementation of 802.1x in bothwired and wireless networks. Complete with step-by-stepinstructions, recommendations to help you choose the bestsolutions, and troubleshooting tips, it lets you benefit from theexperience of others who have met the challenge.
Autoren/Hrsg.
Weitere Infos & Material
Introduction.
Part I Concepts.
Chapter 1 Network Architecture Concepts.
Chapter 2 Port-Based Authentication Concepts.
Part II Standards and Protocols.
Chapter 3 EAPOL Protocol.
Chapter 4 RADIUS Protocols.
Chapter 5 EAP-Methods Protocol.
Part III Implementation.
Chapter 6 Configuring Supplicants.
Chapter 7 Configuring Authenticators.
Chapter 8 Configuring Authentication Servers.
Chapter 9 Troubleshooting.
Appendix RFC 3748: Extensible Authentication Protocol (EAP).
Glossary.
Index.




