Chapter 25. Designing an 802.1x Authentication Infrastructure
Many organizations are investigating the implementation of port-based authentication for both wireless and wired networking. Implementing 802.1x port-based authentication ensures that only computers and users that can authenticate with the network are allowed to connect to the network.
This chapter looks at how to increase your wired and wireless networks’ security ...
Get Microsoft® Windows® Security Resource Kit, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.