From b13fff0ddd350abc88abb41d0d9630f9b70ff31f Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Mon, 18 Dec 2023 10:35:31 -0500 Subject: [PATCH] Update 802_1x.md --- SCOR/802_1x.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/SCOR/802_1x.md b/SCOR/802_1x.md index f57f8c8..9619d5b 100644 --- a/SCOR/802_1x.md +++ b/SCOR/802_1x.md @@ -19,14 +19,14 @@ User Device (Supplicant) <----> Authenticator (Access Switch/Point) <----> Authe -### Key Features of 802.1X: +# Key Features of 802.1X: - **Authentication**: It uses the Extensible Authentication Protocol (EAP) over LAN (EAPOL) to authenticate devices. - **RADIUS Server**: Typically, 802.1X authentication involves three parties: a supplicant (client device), an authenticator (network switch or wireless access point), and an authentication server (usually a RADIUS server). - **Dynamic VLAN Assignment**: Post-authentication, it can assign devices to specific VLANs based on policies. 802.1X is a network access control protocol that is part of the IEEE 802.1 group of networking protocols. It provides an authentication framework for wireless LANs (WLANs) and wired Ethernet networks, offering a means to control and secure network access at the point of entry. Let's dive into its technical aspects and the standards it encompasses. -## Technical Overview of 802.1X +# Technical Overview of 802.1X 1. **Components**: - **Supplicant**: The client device seeking access to the network.