Wireless technologies continue to grow with no sign of slowing down. Today, companies need to understand the advances in wireless security standards so they can easily integrate wireless ...
对于IEEE 802.1x协议在前面我们对它的基本情况已经做了介绍。大家这个局域网的认证协议的概念应该有所掌握了,现在我们再来介绍一下它的特点以及不足之处,之后我们在对他的应用进行介绍。 IEEE 802.1x协议的特点 IEEE 802.1x具有以下主要优点: (1)实现简单。
新一代安全标准IEEE 802.11i定义了RSN(Robust Security Network)的概念,增强了WLAN中的数据加密和认证性能,并且针对WEP加密机制的各种缺陷做了多方面的改进。 IEEE 802.11i规定使用802.1x认证和密钥管理方式,在数据加密方面,定义了TKIP(Temporal Key Integrity Protocol)、CCMP(Counter ...
IEEE 802.1X是IEEE(国际电子电器工程师协会)制定的基于端口的网络接入控制(Port-Based Access Control)标准。尽管它起源于无线局域网标准IEEE 802.11的安全需求,但现在更多应用于有线局域网环境。 一个基于802.1X的认证系统一般包括三个实体组成部分:申请者(Supplicant ...
When WEP's flaws became apparent, the wireless industry started developing new protocols to address the published weak points. These new protocols grew up around the IEEE 802.1x framework, which is a ...
Last month, I covered the 802.11 wireless standard and the various options available for wireless networking. This time, let’s look at the principles of securing ...
Is there such a beast? I've got a heterogenious environment (Linux, Windows, Solaris, VMware) with laptops, workstations and servers, and it's time to implement 802.1x. I'll probably start with the ...
Somehow I'm managed to navigate the whitepapers and all the good/bad advice out there with relatively little hassle have a working WPA/802.1x/PEAP implementation against an IAS server in our AD. I've ...
If I implement 802.1X on my Ethernet switch ports, do I still have to worry about rogue access points? Rogue access points are like cockroaches; they’re everywhere, they’re impossible to get rid of, ...
The more interaction I have with customers who are getting started with Identity projects, the more I realize that a simple explanation and comparison of the differences between EAP types is needed.