mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-10 13:44:12 +00:00
Update 802_1x.md
This commit is contained in:
parent
95ee5e7348
commit
bb9cb3287d
1 changed files with 18 additions and 1 deletions
|
@ -1,6 +1,23 @@
|
|||
# Understanding 802.1X and TrustSec Software-defined Segmentation
|
||||
|
||||
In the ever-evolving landscape of network security, understanding and implementing robust security protocols is paramount. Among these, 802.1X and Cisco TrustSec, which involves software-defined segmentation, play a crucial role in securing network access and data transmission. This article delves into the intricacies of these technologies, elucidating how they contribute to a more secure network environment.
|
||||
In the ever-evolving landscape of network security, understanding and implementing robust security protocols is paramount.
|
||||
|
||||
Among these, 802.1X and Cisco TrustSec, which involves software-defined segmentation, play a crucial role in securing network access and data transmission.
|
||||
|
||||
```
|
||||
User Device (Supplicant) <----> Authenticator (Access Switch/Point) <----> Authentication Server (RADIUS)
|
||||
|
||||
1. [Supplicant] ---- EAPOL-Start ----> [Authenticator]
|
||||
2. [Authenticator] ---- EAP-Request/Identity --> [Supplicant]
|
||||
3. [Supplicant] ---- EAP-Response/Identity -> [Authenticator]
|
||||
4. [Authenticator] ---- EAP-Response/Identity -> [Authentication Server]
|
||||
5. [Authentication Server] ---- EAP-Request (Challenge) ----> [Authenticator]
|
||||
6. [Authenticator] ---- EAP-Request (Challenge) ----> [Supplicant]
|
||||
7. [Supplicant] ---- EAP-Response (Challenge-Response) ----> [Authenticator]
|
||||
8. [Authenticator] ---- EAP-Response (Challenge-Response) ----> [Authentication Server]
|
||||
9. [Authentication Server] <Decision (Success/Fail)> [Authenticator]
|
||||
10. [Authenticator] <Controls Port Access Based on Decision> [Supplicant]
|
||||
```
|
||||
|
||||
## What is 802.1X?
|
||||
|
||||
|
|
Loading…
Reference in a new issue