THE WHATIS.COM WORD-OF-THE-DAY   
December 21, 2001

802.1X 
______________
TODAY'S SPONSOR: VeriSign - The Value of Trust

FREE E-COMMERCE SECURITY GUIDE from VeriSign--Want to kick your
online sales to the next level--while protecting your company from
online fraud? And do it QUICKLY, AFFORDABLY and SECURELY? Get your
FREE copy of "How to Build an E-Commerce Web Site" today:
http://ad.doubleclick.net/clk;3711226;5058249;g?http://www.verisign.com/cgi-bin/go.cgi?a=n095155740616000
______________   
TODAY'S WORD: 802.1X 

See our definition with hyperlinks at
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci787174,00.html

The 802.1X standard is designed to enhance the security of wireless
local area networks (WLANs) that follow the IEEE 802.11 standard.
802.1X provides an authentication framework for wireless LANs,
allowing a user to be authenticated by a central authority. The
actual algorithm that is used to determine whether a user is
authentic is left open and multiple algorithms are possible. 
802.1X uses an existing protocol, the Extensible Authentication
Protocol (EAP, RFC 2284), that works on Ethernet, token ring, or
wireless LANs, for message exchange during the authentication
process. 

In a wireless LAN with 802.1X, a user (known as the supplicant)
requests access to an access point (known as the authenticator). The
access point forces the user (actually, the user's client software)
into an unauthorized state that allows the client to send only an EAP
start message. The access point returns an EAP message requesting the
user's identity. The client returns the identity, which is then
forwarded by the access point to the authentication server, which
uses an algorithm to authenticate the user and then returns an accept
or reject message back to the access point. Assuming an accept was
received, the access point changes the client's state to authorized
and normal traffic can now take place. 

The authentication server may use the Remote Authentication Dial-In
User Service (RADIUS), although 802.1X does not specify it.

RELATED TERMS:

wireless local area networks 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci213379,00.html

802.11 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci341007,00.html

algorithm 
http://searchvb.techtarget.com/sDefinition/0,,sid8_gci211545,00.html

Remote Authentication Dial-In User Service 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci214249,00.html
_________________
SELECTED LINKS

NetworkWorldFusion News describes how 802.1X works. 
http://www.nwfusion.com/news/tech/2001/0924tech.html

Cisco uses 802.1X to enhance the security of 802.11 networks. 
http://www.cisco.com/warp/public/784/packet/jul01/p74-cover.html

SearchNetworking.com provides links to more about "Wireless LANs." 
http://searchnetworking.techtarget.com/bestWebLinks/0,289521,sid7_tax286426,00.html
____________________________________
KNOW IT ALL QUESTION | #85

This locates a specific page on the World Wide Web. 

a. domain name 
b. URL 
c. path 
d. IP address 

>>See correct answer:
http://searchwindowsmanageability.techtarget.com/originalContent/0,289142,sid33_gci787382,00.html
______________________
WIN AN XBOX | HELP YOUR PEERS

Tell your peers about our helpful definitions, industry news, and
Fast References - and an XBox Video Game System could be yours. Click
here for info on how to win:
http://whatis.techtarget.com/referFriendContest/1,290949,sid9,00.html?promo_code=xbox
______________________________________
STORAGE MANAGEMENT CONFERENCE | Hosted by searchStorage

Update: Gain critical business continuity strategies plus backup and
disaster recovery expertise at the only independent storage-specific
conference focused on storage management. Apply early to qualify to
attend FREE at:
http://ad.doubleclick.net/clk;3559407;5058249;r?http://www.storagemanagement2002.com
_________________________   
RECENT ADDITIONS AND UPDATES 

[1] chaffing and winnowing 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci786707,00.html

[2] operational data store 
http://searchdatabase.techtarget.com/sDefinition/0,,sid13_gci786730,00.html

[3] automated speech recognition 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci786138,00.html

[4] Enhanced Messaging Service 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci785459,00.html

[5] HiperLAN
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci341473,00.html

======================================================== 
If you would like to sponsor this or any techtarget newsletter,
please contact Gabrielle DeRussy at [EMAIL PROTECTED]
========================================================


If you no longer wish to receive this newsletter simply reply to 
this message with "REMOVE" in the subject line.  Or, visit 
http://WhatIs.techtarget.com/register 
and adjust your subscriptions accordingly. 

If you choose to unsubscribe using our automated processing, you 
must send the "REMOVE" request from the email account to which 
this newsletter was delivered.  Please allow 24 hours for your 
"REMOVE" request to be processed.

Reply via email to