mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-22 02:43:02 +00:00
Update 802_1x.md
This commit is contained in:
parent
bb9cb3287d
commit
5ea9759961
1 changed files with 2 additions and 6 deletions
|
@ -1,8 +1,6 @@
|
|||
# Understanding 802.1X and TrustSec Software-defined Segmentation
|
||||
# What is 802.1X?
|
||||
|
||||
In the ever-evolving landscape of network security, understanding and implementing robust security protocols is paramount.
|
||||
|
||||
Among these, 802.1X and Cisco TrustSec, which involves software-defined segmentation, play a crucial role in securing network access and data transmission.
|
||||
802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is a protocol that enhances security in networks, both wired and wireless, by providing an authentication mechanism for devices trying to connect to a LAN or WLAN.
|
||||
|
||||
```
|
||||
User Device (Supplicant) <----> Authenticator (Access Switch/Point) <----> Authentication Server (RADIUS)
|
||||
|
@ -19,9 +17,7 @@ User Device (Supplicant) <----> Authenticator (Access Switch/Point) <----> Authe
|
|||
10. [Authenticator] <Controls Port Access Based on Decision> [Supplicant]
|
||||
```
|
||||
|
||||
## What is 802.1X?
|
||||
|
||||
802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is a protocol that enhances security in networks, both wired and wireless, by providing an authentication mechanism for devices trying to connect to a LAN or WLAN.
|
||||
|
||||
### Key Features of 802.1X:
|
||||
- **Authentication**: It uses the Extensible Authentication Protocol (EAP) over LAN (EAPOL) to authenticate devices.
|
||||
|
|
Loading…
Reference in a new issue