| Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of computer networking, presenting an introductory overview as well as a subject overview in each chapter. It provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, this book also addresses troubleshooting issues in a Cisco environment.
So what is this book about? That is the question that everyone will ask when they pick this up. This book is about one aspect of network security. A friend told me that I needed to identify what network I was talking about.
Is it a television network? Or a collection of highways? No, this network is a means of connecting computerized devices to allow them to communicate with one another. To a certain extent, the physical method of connection is moot. It can be a series of wires or it can be wireless. In fact, both types of mediums will be explored. The aspect of security that is associated with that network and is encompassed by this book is called port-based authentication. |