Implementing 802.1X Security Solutions for Wired and Wireless Networks~tqw~_darksiderg.nfo
Implementing 802.1X Security Solutions for Wired and Wireless Networks~tqw~_darksiderg.pdf
You know it's essential, and you've heard that it can be tricky — implementing
the 802.1x standard. Here is a road map that will steer you safely around the
pitfalls, smooth out the rough patches, and guide you to a successful
implementation of 802.1x in both wired and wireless networks. Complete with
step-by-step instructions, recommendations to help you choose the best
solutions, and troubleshooting tips, it lets you benefit from the experience
of others who have met the challenge.
Table Of Contents:
Part I Concepts.
Chapter 1 Network Architecture Concepts.
Chapter 2 Port-Based Authentication Concepts.
Part II Standards and Protocols.
Chapter 3 EAPOL Protocol.
Chapter 4 RADIUS Protocols.
Chapter 5 EAP-Methods Protocol.
Part III Implementation.
Chapter 6 Configuring Supplicants.
Chapter 7 Configuring Authenticators.
Chapter 8 Configuring Authentication Servers.
Chapter 9 Troubleshooting.
Appendix RFC 3748: Extensible Authentication Protocol (EAP).