Implementing 802.1X Security Solutions for Wired and Wireless Networks
John Wiley & Sons Inc (Verlag)
978-0-470-16860-8 (ISBN)
- Keine Verlagsinformationen verfügbar
- Artikel merken
You know it's essential, and you've heard that it can be tricky implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.
Jim Geier is the founder of Wireless-Nets, Ltd., and a 25-year expert on network-based systems. His experience includes analysis, design, software development, installation, and support for secure wireless networks in both public and private use. He has written several books, articles, and tutorials on wireless LANs and Wi-Fi.
Introduction. Part I Concepts. Chapter 1 Network Architecture Concepts. Chapter 2 Port-Based Authentication Concepts. Part II Standards and Protocols. Chapter 3 EAPOL Protocol. Chapter 4 RADIUS Protocols. Chapter 5 EAP-Methods Protocol. Part III Implementation. Chapter 6 Configuring Supplicants. Chapter 7 Configuring Authenticators. Chapter 8 Configuring Authentication Servers. Chapter 9 Troubleshooting. Appendix RFC 3748: Extensible Authentication Protocol (EAP). Glossary. Index.
Erscheint lt. Verlag | 4.4.2008 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 185 x 253 mm |
Gewicht | 720 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Technik ► Nachrichtentechnik | |
ISBN-10 | 0-470-16860-9 / 0470168609 |
ISBN-13 | 978-0-470-16860-8 / 9780470168608 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich