Implementing 802.1x Security Solutions for Wired and Wireless Networks (häftad)
Format
Inbunden (Hardback)
Språk
Engelska
Antal sidor
330
Utgivningsdatum
2008-04-01
Upplaga
illustrated ed
Förlag
WILEY
Illustrationer
Illustrations
Dimensioner
242 x 190 x 24 mm
Vikt
680 g
Antal komponenter
1
ISBN
9780470168608

Implementing 802.1x Security Solutions for Wired and Wireless Networks

Inbunden,  Engelska, 2008-04-01
529
Tillfälligt slut – klicka "Bevaka" för att få ett mejl så fort boken går att köpa igen.
Finns även som
You know it?s essential, and you've heard that it can be tricky ? implementing the 802.1x standard. Here is a road map that will enable you to approach 802.1x implementation with confidence so that you can conduct successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Jim Geier

  • Designing and Deploying 802.11n Wireless Networks

    Jim Geier

    Gain a practical understanding of the underlying concepts of the 802.11n standard and the methodologies for completing a successful wireless network installation Practical, start-to-finish guidance for successful deployment of 802.11n wireless LAN...

Övrig information

Jim Geier is the founder of Wireless-Nets, Ltd., and a 25-year expert on network-based systems. His experience includes analysis, design, software development, installation, and support for secure wireless networks in both public and private use. He has written several books, articles, and tutorials on wireless LANs and Wi-Fi.

Innehållsförteckning

Introduction.

Part I Concepts.

Chapter 1 Network Architecture Concepts.

Chapter 2 Port-Based Authentication Concepts.

Part II Standards and Protocols.

Chapter 3 EAPOL Protocol.

Chapter 4 RADIUS Protocols.

Chapter 5 EAP-Methods Protocol.

Part III Implementation.

Chapter 6 Configuring Supplicants.

Chapter 7 Configuring Authenticators.

Chapter 8 Configuring Authentication Servers.

Chapter 9 Troubleshooting.

Appendix RFC 3748: Extensible Authentication Protocol (EAP).

Glossary.

Index.