| 000 | 00969camuu2200289 a 4500 | |
| 001 | 000045394084 | |
| 005 | 20071026153402 | |
| 008 | 060918s2007 flua 001 0 eng | |
| 010 | ▼a 2006030999 | |
| 015 | ▼a GBA676638 ▼2 bnb | |
| 020 | ▼a 1420044648 (alk. paper) | |
| 020 | ▼a 9781420044645 (alk. paper) | |
| 035 | ▼a (KERIS)REF000012811499 | |
| 040 | ▼a DLC ▼c DLC ▼d BAKER ▼d UKM ▼d C#P ▼d YDX ▼d YDXCP ▼d DLC ▼d 211009 | |
| 050 | 0 0 | ▼a TK5105.59 ▼b .B765 2007 |
| 082 | 0 0 | ▼a 005.8 ▼2 22 |
| 090 | ▼a 005.8 ▼b B877e | |
| 100 | 1 | ▼a Brown, Edwin Lyle. |
| 245 | 1 0 | ▼a 802.1X port-based authentication / ▼c Edwin Lyle Brown. |
| 260 | ▼a Boca Raton : ▼b Auerbach , ▼c c2007. | |
| 300 | ▼a 238 p. : ▼b ill. ; ▼c 25 cm. | |
| 500 | ▼a Includes index. | |
| 650 | 0 | ▼a Computer networks ▼x Security measures ▼x Standards. |
| 650 | 0 | ▼a Computers ▼x Access control ▼x Standards. |
| 650 | 0 | ▼a Computer network protocols. |
| 945 | ▼a KINS |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.8 B877e | 등록번호 121157420 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Port-based authentication is a “network access control” concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL).
The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview.
Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today’s computer networks using this particular network protocol.
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today’s computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of computer networking, presenting an introductory overview as well as a subject overview in each chapter. It provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, this book also addresses troubleshooting issues in a Cisco environment.
정보제공 :
목차
Overview What Is 802.1X and Why Should I Care? The History and Technical Documents How Does It Work? Technical Discussion EAPOL, EAP and EAP Methods Radius Management Security Concerns Configuring 802.IX Wireless Design, Implementation and Troubleshooting Design A Very Simple Network What If It Didn’t Work Right? Guests What Do I Do With My Printers and Servers? Unplanned Expansion Expand to Wireless IP Telephony A Not So Simple Network Design Recap Index
정보제공 :
