Cover image for Implementing 802.1X security solutions for wired and wireless networks
Title:
Implementing 802.1X security solutions for wired and wireless networks
Personal Author:
Publication Information:
Indianapolis, IN : Wiley Publishing, 2008
Physical Description:
xxiii, 330 p. : ill. 24 cm.
ISBN:
9780470168608

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010191536 TK5105.59 G44 2008 Open Access Book Book
Searching...
Searching...
30000010183987 TK5105.59 G44 2008 Open Access Book Book
Searching...
Searching...
30000010205127 TK5105.59 G44 2008 Open Access Book Book
Searching...

On Order

Summary

Summary

Implementing 802.1x Security Solutions for Wired and Wireless Networks

Now you can approach 802.1x implementation with confidence

You know it's essential, and you've heard that it can be tricky -- implementing the 802.1x standard. Here is a road map that will steer you safely around the pitfalls, smooth out the rough patches, and guide you to a successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.

Get an overview of port-based authentication and network architecture concepts Examine EAPOL, RADIUS, and EAP-Methods protocols Understand 802.1x protocol packet structure and operation Explore and evaluate complete 802.1x-based security solutions for various needs Learn what parts are necessary to construct a complete network access-control system Configure your system and assure that all aspects of it work together Follow step-by-step instructions and screen shots to successfully set up 802.1x-based security solutions and make them work


Author Notes

JIM GEIER is the founder of Wireless-Nets, Ltd., and a 25-year expert on network-based systems. His experience includes analysis, design, software development, installation, and support for secure wireless networks in both public and private use. He has written several books, articles, and tutorials on wireless LANs and Wi-Fi.


Table of Contents

Introduction
Part I Concepts
Chapter 1 Network Architecture Concepts
Chapter 2 Port-Based Authentication Concepts
Part II Standards and Protocols
Chapter 3 EAPOL Protocol
Chapter 4 RADIUS Protocols
Chapter 5 EAP-Methods Protocol
Part III Implementation
Chapter 6 Configuring Supplicants
Chapter 7 Configuring Authenticators
Chapter 8 Configuring Authentication Servers
Chapter 9 Troubleshooting
Appendix RFC 3748: Extensible Authentication Protocol (EAP
Glossary
Index