Muutke küpsiste eelistusi
  • Formaat - PDF+DRM
  • Hind: 73,31 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 256 pages
  • Ilmumisaeg: 19-Dec-2006
  • Kirjastus: Auerbach
  • ISBN-13: 9781420044652

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Port-based authentication is a network access control concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL).

The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview.

Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to todays computer networks using this particular network protocol.
1 Overview 1
1.1 What Is 802.1X and Why Should I Care?
2
1.2 The History and Technical Documents
9
1.3 How Does It Work?
19
2 Technical Discussion 39
2.1 EAPOL, EAP, and EAP-Methods
40
2.2 Radius
66
2.3 Management
77
2.4 Security Concerns
86
2.5 Configuring 802.1X
92
2.6 Wireless
110
3 Design, Implementation, and Troubleshooting 119
3.1 Design
121
3.2 A Veiy Simple Network
131
3.3 What If It Didn't Work Right?
165
3.4 Guests
175
3.5 What Do I Do With My Printers and Servers?
182
3.6 Unplanned Expansion
188
3.7 Expanding to Wireless
195
3.8 IP Telephony
204
3.9 A Not So Simple Network
210
3.10 Design Recap
218
Index 231


Brown, Edwin Lyle