- Hardcover: 330 pages
- Publisher: Wiley; 1 edition (April 14, 2008)
- Language: English
- ISBN-10: 0470168609
- ISBN-13: 978-0470168608
- Product Dimensions: 7.7 x 1 x 9.6 inches
- Shipping Weight: 1.6 pounds (View shipping rates and policies)
- Average Customer Review: 7 customer reviews
- Amazon Best Sellers Rank: #1,430,339 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Implementing 802.1X Security Solutions for Wired and Wireless Networks 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
"Rebound" by Kwame Alexander
Don't miss best-selling author Kwame Alexander's "Rebound," a new companion novel to his Newbery Award-winner, "The Crossover,"" illustrated with striking graphic novel panels. Pre-order today
Frequently bought together
Customers who viewed this item also viewed
Customers who bought this item also bought
From the Back Cover
Now you can approach 802.1x implementation with confidence
You know it's essential, and you've heard that it can be tricky — implementing the 802.1x standard. Here is a road map that will steer you safely around the pitfalls, smooth out the rough patches, and guide you to a successful implementation of 802.1x in both wired and wireless networks. Complete with step-by-step instructions, recommendations to help you choose the best solutions, and troubleshooting tips, it lets you benefit from the experience of others who have met the challenge.
Get an overview of port-based authentication and network architecture concepts
Examine EAPOL, RADIUS, and EAP-Methods protocols
Understand 802.1x protocol packet structure and operation
Explore and evaluate complete 802.1x-based security solutions for various needs
Learn what parts are necessary to construct a complete network access-control system
Configure your system and assure that all aspects of it work together
Follow step-by-step instructions and screen shots to successfully set up 802.1x-based security solutions and make them work
About the Author
Jim Geier is the founder of Wireless-Nets, Ltd., and a 25-year expert on network-based systems. His experience includes analysis, design, software development, installation, and support for secure wireless networks in both public and private use. He has written several books, articles, and tutorials on wireless LANs and Wi-Fi.
Author interviews, book reviews, editors picks, and more. Read it now
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
However, out of the book's 330 pages , it has 109 pages on RFCs and glossary.
The book also lacks at least one EAP method supplicant-authenticator-authentication server trace file with Wireshark, that shows the full end-to-end exchange in detail. That would have been great for introductory and advanced users as well. The book lacks this deeper look, anyway, it is introductory.
I will say the shipping did take a long time for me (about 2-2.5 weeks).
It is a good book for 802.1x protocol learning. It teaches a lot about the packets structures and low level information. It teaches some nice tips about WiFi as bonus. Very easy reading.
I think it could tell more about the practice. It looks like 1/3 of the book is RFC, that we can easily find on Internet.
The book begins with a short 30 page review of network architectures. This review makes for a nice refresher before diving into the 802.1X information. However, unlike many books that attempt to meet a publisher page count by reviewing information the reader should know for 40-50 percent of the book, Implementing 802.1X Security Solutions leaves the refreshers here in the first chapter and spends the remaining 8 chapters and Appendix truly covering the named topic of the book. In all, more than 200 pages are dedicated to the topics related to 802.1X security solutions.
The Appendix coverage of EAP is welcomed and provides enough information to understand its operations and how to select the best EAP solution for your implementation.
I would give this book 10 stars on a 10 star rating system. Most of the books that I give five stars, here at Amazon, would only get 9 stars on a 10 star system. Jim Geier has really outdone himself with this one.
In the summery of the book by Jim Geier, even the author states "802.1X port-based authentication is much more difficult to understand and implement than is commonly thought." and I agree with him that "This book, however, pulls together all of the pertinent standards and specifications, providing the concepts, methods, and tips you need to avoid common pitfalls, saving you a great deal of time and frustration."
Reading this book helps the network architect design or redesign a network that is not only one of most secured networks in town but as a plus it helps a medium to large networks do a self administration.
just imagine having all your ports on all your switches connected and available and yet only allow authorized and authenticated users or devices access to services based on credentials provided, and send the rest to null or treat them as guests and give them access to your web site only; Create dynamic VLANs drop users to it based on groups. Have a IP phone network that uses the same switches and yet has no access to company resources all of these are possible and Jim Geier does a good job explaining how.
This book is very well written with proper examples and case studies, and yet it is not a perfect 5 star worthy since it's missing few important and relevant pieces, for example, I was looking for more on certificates, not just the mere mention of them but the configuration distribution and perhaps integration with smart cards, I know you can get that from another book but why? it would be nice to also show how IP phones can be configured and a dynamic VLAN created; Also how none 802.1x devices can be connected to the switch and use company resources; The author should have also explained on how Trunk-ed, span-ed, secured and Dynamic access ports can not be configured as 802.1x; And is it possible to have a heterogeneous environment where both 802.1x and non port authentication designs can be implemented as a viable solution?
I am an advocate of the IEEE 802.1x standard, it reminds me of Cheers Theme "Where Everybody Knows Your Name" or else you have no access. And hence, I recommend this book, it will help you understand the standard, get you started implementing or migrating to a more secured network.
Best Fishes and thank you for reading.