THE WHATIS.COM WORD-OF-THE-DAY December 21, 2001 802.1X ______________ TODAY'S SPONSOR: VeriSign - The Value of Trust
FREE E-COMMERCE SECURITY GUIDE from VeriSign--Want to kick your online sales to the next level--while protecting your company from online fraud? And do it QUICKLY, AFFORDABLY and SECURELY? Get your FREE copy of "How to Build an E-Commerce Web Site" today: http://ad.doubleclick.net/clk;3711226;5058249;g?http://www.verisign.com/cgi-bin/go.cgi?a=n095155740616000 ______________ TODAY'S WORD: 802.1X See our definition with hyperlinks at http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci787174,00.html The 802.1X standard is designed to enhance the security of wireless local area networks (WLANs) that follow the IEEE 802.11 standard. 802.1X provides an authentication framework for wireless LANs, allowing a user to be authenticated by a central authority. The actual algorithm that is used to determine whether a user is authentic is left open and multiple algorithms are possible. 802.1X uses an existing protocol, the Extensible Authentication Protocol (EAP, RFC 2284), that works on Ethernet, token ring, or wireless LANs, for message exchange during the authentication process. In a wireless LAN with 802.1X, a user (known as the supplicant) requests access to an access point (known as the authenticator). The access point forces the user (actually, the user's client software) into an unauthorized state that allows the client to send only an EAP start message. The access point returns an EAP message requesting the user's identity. The client returns the identity, which is then forwarded by the access point to the authentication server, which uses an algorithm to authenticate the user and then returns an accept or reject message back to the access point. Assuming an accept was received, the access point changes the client's state to authorized and normal traffic can now take place. The authentication server may use the Remote Authentication Dial-In User Service (RADIUS), although 802.1X does not specify it. RELATED TERMS: wireless local area networks http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213379,00.html 802.11 http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci341007,00.html algorithm http://searchvb.techtarget.com/sDefinition/0,,sid8_gci211545,00.html Remote Authentication Dial-In User Service http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214249,00.html _________________ SELECTED LINKS NetworkWorldFusion News describes how 802.1X works. http://www.nwfusion.com/news/tech/2001/0924tech.html Cisco uses 802.1X to enhance the security of 802.11 networks. http://www.cisco.com/warp/public/784/packet/jul01/p74-cover.html SearchNetworking.com provides links to more about "Wireless LANs." http://searchnetworking.techtarget.com/bestWebLinks/0,289521,sid7_tax286426,00.html ____________________________________ KNOW IT ALL QUESTION | #85 This locates a specific page on the World Wide Web. a. domain name b. URL c. path d. IP address >>See correct answer: http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci787382,00.html ______________________ WIN AN XBOX | HELP YOUR PEERS Tell your peers about our helpful definitions, industry news, and Fast References - and an XBox Video Game System could be yours. Click here for info on how to win: http://whatis.techtarget.com/referFriendContest/1,290949,sid9,00.html?promo_code=xbox ______________________________________ STORAGE MANAGEMENT CONFERENCE | Hosted by searchStorage Update: Gain critical business continuity strategies plus backup and disaster recovery expertise at the only independent storage-specific conference focused on storage management. Apply early to qualify to attend FREE at: http://ad.doubleclick.net/clk;3559407;5058249;r?http://www.storagemanagement2002.com _________________________ RECENT ADDITIONS AND UPDATES [1] chaffing and winnowing http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci786707,00.html [2] operational data store http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci786730,00.html [3] automated speech recognition http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci786138,00.html [4] Enhanced Messaging Service http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci785459,00.html [5] HiperLAN http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci341473,00.html ======================================================== If you would like to sponsor this or any techtarget newsletter, please contact Gabrielle DeRussy at [EMAIL PROTECTED] ======================================================== If you no longer wish to receive this newsletter simply reply to this message with "REMOVE" in the subject line. Or, visit http://WhatIs.techtarget.com/register and adjust your subscriptions accordingly. If you choose to unsubscribe using our automated processing, you must send the "REMOVE" request from the email account to which this newsletter was delivered. Please allow 24 hours for your "REMOVE" request to be processed.