Chapter 25. Designing an 802.1x Authentication Infrastructure

In this chapter: 
How 802.1x Authentication Works515
Threats Faced in Networked Environments517
802.1x Authentication Types521
Protecting Communications522
Planning Certificates for 802.1x Authentication525
Deploying Certificates to Users and Computers527
Implementing 802.1x Authentication530
Best Practices543
Additional Information544

Many organizations are investigating the implementation of port-based authentication for both wireless and wired networking. Implementing 802.1x port-based authentication ensures that only computers and users that can authenticate with the network are allowed to connect to the network.

This chapter looks at how to increase your wired and wireless networks’ security ...

Get Microsoft® Windows® Security Resource Kit, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.