![]() Recently, Cisco began working with other vendors to make its equipment and software LEAP-compliant. This is a very proprietary solution and initially worked only with Cisco Client 802.11 cards, RADIUS Servers, and Cisco Access Points. As a result, four types of EAP implementations have emerged as “standards.” They all share the same underlying 802.1x and EAP architecture, but the ways they implement the EAP are different.Ĭisco was one of the first vendors to market with its Lightweight EAP (LEAP) “standard” in December 2000. Because the 802.1x and EAP are open standards, implementation is left to individual vendors. Now we’ll tell you what it takes to actually build an 802.1x/EAP solution. In part one of this two-part series, we discussed the new 802.1x/EAP combination that allows you to manage and distribute encryption keys on a user- and session-level basis. Here's how to choose the best solution.Īn emerging standard in wireless security finally is giving IT departments a way to fend off key-sniffing hackers and users who install their own unauthorized access points. ![]() ![]() But because 802.1x and EAP are open standards, implementation is left to individual vendors. With 802.1x standards coupled with EAP, the IEEE has met the gold standard in LAN security. Choosing a vendor solution for wireless LAN security with 802.1x and EAP ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |