Demystifying Wireless Network Access and 802.1X Security
sponsored by Fluke Networks

Network managers and network users are concerned about network access and security. A network manager wants assurance that the client requesting access to his network is really who they say they are - an authorized user and not an imposter. Similarly, a network user wants assurance that when he connects his wireless notebook PC to his network, he is really connecting to his network - and not to a counterfeit network thrown together by a hacker to intercept user information. This paper provides insight into the typical wireless LAN client login process and 802.1X and EAP authentication processes.
(THIS RESOURCE IS NO LONGER AVAILABLE.)
 
See what other users are reading via our Daily Top 50 Report
.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement