802.1X Port-Based Authentication

802.1X Port-Based Authentication

English | 2019 | 254 Pages | ISBN: 0367389673 | PDF | 3.8 MB

Port-based authentication is a "network access control" concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL).
The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview.
Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today's computer networks using this particular network protocol.

Download:

http://longfiles.com/q2iw070pou29/802.1X_Port-Based_Authentication.pdf.html

[Fast Download] 802.1X Port-Based Authentication


Related eBooks:
Network Algorithms, Data Mining, and Applications
Networked RFID: Systems, Software and Services
Communicating Space Exploration
A Guide to Computer Network Security
Direct Adaptive Control Algorithms
The Essential Guide to Telecommunications, 6th Edition
Developments in Antenna Analysis and Design, Volume 2
Indigenous People and Mobile Technologies
Weaving the Dark Web: Legitimacy on Freenet, Tor, and I2P
Queueing Theory with Applications to Packet Telecommunication
Cognitive Radio Architecture: The Engineering Foundations of Radio XML
Space Weather & Telecommunications
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.