Implementing 802.1X security solutions for wired and wireless networks / Jim Geier.

Contents Ch. 1. Network architecture concepts -- ch. 2. Port-based authentication concepts -- ch. 3. EAPOL protocol -- ch. 4. RADIUS protocols -- ch. 5. EAP-methods protocol -- ch. 6. Configuring supplicants -- ch. 7. Configuring authenticators -- ch. 8. Configuring authentication servers -- ch. 9. Troubleshooting -- Appendix: RFC 3748: extensible authentication protocol (EAP).
General noteIncludes index.
Access restrictionAvailable only to authorized users.
Technical detailsMode of access: World Wide Web
Genre/formElectronic books.
LCCN 2012392957
ISBN9780470168608 (cased)
ISBN0470168609 (cased)

Availability

Library Location Call Number Status Item Actions
Electronic Resources Access Content Online ✔ Available