Skip to main content

Implementing 802.1X Security Solutions for Wired and Wireless Networks

Implementing 802.1X Security Solutions for Wired and Wireless Networks

Jim Geier

ISBN: 978-0-470-16860-8

Apr 2008

330 pages

In Stock

$65.00

Description

You know it?s essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.
Introduction.

Part I Concepts.

Chapter 1 Network Architecture Concepts.

Chapter 2 Port-Based Authentication Concepts.

Part II Standards and Protocols.

Chapter 3 EAPOL Protocol.

Chapter 4 RADIUS Protocols.

Chapter 5 EAP-Methods Protocol.

Part III Implementation.

Chapter 6 Configuring Supplicants.

Chapter 7 Configuring Authenticators.

Chapter 8 Configuring Authentication Servers.

Chapter 9 Troubleshooting.

Appendix RFC 3748: Extensible Authentication Protocol (EAP).

Glossary.

Index.