Cover image for Implementing 802.1X Security Solutions for Wired and Wireless Networks.
Implementing 802.1X Security Solutions for Wired and Wireless Networks.
Title:
Implementing 802.1X Security Solutions for Wired and Wireless Networks.
Author:
Geier, Jim.
ISBN:
9780470370285
Personal Author:
Edition:
1st ed.
Physical Description:
1 online resource (356 pages)
Contents:
Implementing 802.1X Security Solutions for Wired and Wireless Networks -- About the Author -- Credits -- Contents -- Introduction -- Part I: Concepts -- Chapter 1: Network Architecture Concepts -- Computer Network Defined -- Network Components -- Network Types -- Logical Network Architecture -- IEEE 802 Standards -- Wireless Impairments -- Addressing -- Chapter 2: Port-Based Authentication Concepts -- 802.1X Port-Based Authentication Terminology -- Authentication Benefits -- Primary Components -- Port-Based Authentication Operation -- A Historical Perspective -- Part II: Standards and Protocols -- Chapter 3: EAPOL Protocol -- EAPOL Recap -- EAPOL Encapsulation -- EAPOL Packet Structure -- EAPOL Packet Types -- EAP Packet Structure -- EAP Packet Types -- 802.3 Frame Structure -- 802.11 Frame Structure -- Chapter 4: RADIUS Protocols -- RADIUS Recap -- RADIUS Packet Structure -- RADIUS Packet Types -- RADIUS Attributes -- Authentication Server Selection Considerations -- Chapter 5: EAP-Methods Protocol -- EAP-Methods Recap -- EAP-Method Encapsulation -- EAP-Method Packet Structure -- Original EAP-Method Types -- Additional EAP-Method Types -- Wi-Fi Alliance Certification -- EAP-Method Selection Considerations -- Part III: Implementation -- Chapter 6: Configuring Supplicants -- Supplicant Recap -- Choosing Supplicants -- Common Supplicant Configuration Parameters -- Configuring Client Radios -- Chapter 7: Configuring Authenticators -- Authenticator Recap -- Choosing Authenticators -- Common Authenticator Configuration Parameters -- Configuring Wireless Access Points -- Authenticator Management -- Chapter 8: Configuring Authentication Servers -- Authentication Server Recap -- Choosing RADIUS Servers -- Installing RADIUS Software -- Common RADIUS Configuration Parameters -- Chapter 9: Troubleshooting -- Troubleshooting Approaches -- Test Tools.

Network Connectivity Issues -- Supplicant Issues -- Authenticator Issues -- Authentication Server Issues -- Guest Access Issues -- Appendix: RFC 3748: Extensible Authentication Protocol (EAP) -- Extensible Authentication Protocol (EAP) -- 1. Introduction -- 2. Extensible Authentication Protocol (EAP) -- 3. Lower Layer Behavior -- 4. EAP Packet Format -- 5. Initial EAP Request/Response Types -- 6. IANA Considerations -- 7. Security Considerations -- 8. Acknowledgements -- 9. References -- Appendix A. Changes from RFC 2284 -- Full Copyright Statement -- GLOSSARY -- Index.
Abstract:
Jim Geier is the founder of Wireless-Nets, Ltd., and a 25-year expert on network-based systems. His experience includes analysis, design, software development, installation, and support for secure wireless networks in both public and private use. He has written several books, articles, and tutorials on wireless LANs and Wi-Fi.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: