Implementing 802.1X Security Solutions for Wired and Wireless Networks
- 4h 31m
- Jim Geier
- John Wiley & Sons (US)
- 2008
You know it's essential, and you've heard that it can be tricky — implementing the 802.1x standard. Here is a road map that will steer you safely around the pitfalls, smooth out the rough patches, and guide you to a successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.
- Get an overview of port-based authentication and network architecture concepts
- Examine EAPOL, RADIUS, and EAP-Methods protocols
- Understand 802.1x protocol packet structure and operation
- Explore and evaluate complete 802.1x-based security solutions for various needs
- Learn what parts are necessary to construct a complete network access-control system
- Configure your system and assure that all aspects of it work together
- Follow step-by-step instructions and screen shots to successfully set up 802.1x-based security solutions and make them work
About the Author
Jim Geier is the founder of Wireless-Nets, Ltd., and the company’s principal consultant. His 25 years of experience includes the analysis, design, software development, installation, and support of numerous secure wireless network-based systems for municipalities, enterprises, airports, homes, retail stores, manufacturing facilities, warehouses, and hospitals worldwide. Jim is the author of several books, including Deploying Voice over Wireless LANs (Cisco Press), Wireless LANs (SAMS), Wireless Networks — First Step (Cisco Press), Wireless Networking Handbook (Macmillan), and Network Reengineering (McGraw-Hill). He is the author of numerous tutorials for Wi-FiPlanet.com and other publications. Jim has been active within the Wi-Fi Alliance, responsible for certifying interoperability of 802.11 (Wi-Fi) wireless LANs. He has also been an active member of the IEEE 802.11 Working Group, responsible for developing international standards for wireless LANs. He served as Chairman of the IEEE Computer Society, Dayton Section, and Chairman of the IEEE International Conference on Wireless LAN Implementation. He is an advisory board member of several leading wireless LAN companies. Jim’s education includes a bachelor’s and master’s degree in electrical engineering and a master’s degree in business administration.
In this Book
-
Network Architecture Concepts
-
Port-Based Authentication Concepts
-
EAPOL Protocol
-
RADIUS Protocols
-
EAP-Methods Protocol
-
Configuring Supplicants
-
Configuring Authenticators
-
Configuring Authentication Servers
-
Troubleshooting