You know it′s essential, and you′ve heard that it can be tricky implementing the 802.1x standard. Here is a road map that will steer you safely around the pitfalls, smooth out the rough patches, and guide you to a successful implementation of 802.1x in both wired and wireless networks. Complete with step–by–step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.
Get an overview of port–based authentication and network architecture concepts
Examine EAPOL, RADIUS, and EAP–Methods protocols
Understand 802.1x protocol packet structure and operation
Explore and evaluate complete 802.1x–based security solutions for various needs
Learn what parts are necessary to construct a complete network access–control system
Configure your system and assure that all aspects of it work together
Follow step–by–step instructions and screen shots to successfully set up 802.1x–based security solutions and make them work
Part I Concepts.
Chapter 1 Network Architecture Concepts.
Chapter 2 Port–Based Authentication Concepts.
Part II Standards and Protocols.
Chapter 3 EAPOL Protocol.
Chapter 4 RADIUS Protocols.
Chapter 5 EAP–Methods Protocol.
Part III Implementation.
Chapter 6 Configuring Supplicants.
Chapter 7 Configuring Authenticators.
Chapter 8 Configuring Authentication Servers.
Chapter 9 Troubleshooting.
Appendix RFC 3748: Extensible Authentication Protocol (EAP).