1 option
Implementing 802.1X security solutions for wired and wireless networks / Jim Geier.
- Format:
- Book
- Author/Creator:
- Geier, James T.
- Language:
- English
- Subjects (All):
- Computer networks--Security measures.
- Computer networks.
- IEEE 802.11 (Standard).
- IEEE 802.16 (Standard).
- Wireless LANs.
- Physical Description:
- 1 online resource (356 p.)
- Edition:
- 1st ed.
- Place of Publication:
- Indianapolis, IN : Wiley, c2008.
- Language Note:
- English
- Summary:
- You know it's essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.
- Contents:
- Implementing 802.1X Security Solutions for Wired and Wireless Networks; About the Author; Credits; Contents; Introduction; Part I: Concepts; Chapter 1: Network Architecture Concepts; Computer Network Defined; Network Components; Network Types; Logical Network Architecture; IEEE 802 Standards; Wireless Impairments; Addressing; Chapter 2: Port-Based Authentication Concepts; 802.1X Port-Based Authentication Terminology; Authentication Benefits; Primary Components; Port-Based Authentication Operation; A Historical Perspective; Part II: Standards and Protocols; Chapter 3: EAPOL Protocol
- EAPOL RecapEAPOL Encapsulation; EAPOL Packet Structure; EAPOL Packet Types; EAP Packet Structure; EAP Packet Types; 802.3 Frame Structure; 802.11 Frame Structure; Chapter 4: RADIUS Protocols; RADIUS Recap; RADIUS Packet Structure; RADIUS Packet Types; RADIUS Attributes; Authentication Server Selection Considerations; Chapter 5: EAP-Methods Protocol; EAP-Methods Recap; EAP-Method Encapsulation; EAP-Method Packet Structure; Original EAP-Method Types; Additional EAP-Method Types; Wi-Fi Alliance Certification; EAP-Method Selection Considerations; Part III: Implementation
- Chapter 6: Configuring Supplicants Supplicant Recap; Choosing Supplicants; Common Supplicant Configuration Parameters; Configuring Client Radios; Chapter 7: Configuring Authenticators; Authenticator Recap; Choosing Authenticators; Common Authenticator Configuration Parameters; Configuring Wireless Access Points; Authenticator Management; Chapter 8: Configuring Authentication Servers; Authentication Server Recap; Choosing RADIUS Servers; Installing RADIUS Software; Common RADIUS Configuration Parameters; Chapter 9: Troubleshooting; Troubleshooting Approaches; Test Tools
- Network Connectivity Issues Supplicant Issues; Authenticator Issues; Authentication Server Issues; Guest Access Issues; Appendix: RFC 3748: Extensible Authentication Protocol (EAP); Extensible Authentication Protocol (EAP); 1. Introduction; 2. Extensible Authentication Protocol (EAP); 3. Lower Layer Behavior; 4. EAP Packet Format; 5. Initial EAP Request/Response Types; 6. IANA Considerations; 7. Security Considerations; 8. Acknowledgements; 9. References; Appendix A. Changes from RFC 2284; Full Copyright Statement; GLOSSARY; Index
- Notes:
- Includes index.
- Description based on metadata supplied by the publisher and other sources.
- ISBN:
- 9786611381844
- 9781281381842
- 1281381845
- 9780470370285
- 0470370289
- OCLC:
- 254393126
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.