O'Reilly logo

Introduction to Computer Networks and Cybersecurity by J. David Irwin, Chwan-Hwa Wu

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 25

Network Access Control and Wireless Network Security

The learning goals for this chapter are as follows:

  • Understand the structure and function of the many system components that provide for Network Access Control (NAC)
  • Explore the components and function of the Kerberos protocol, and the fundamental role it plays in authentication
  • Learn the function and structure of the Trusted Program Module (TPM) and its role in support of NAC
  • Explore the use of multiple factor authentications and the attendant standards when using cryptographic tokens and Trusted Program Modules
  • Explore the structure and methods employed with the 802.1X protocol in providing port-based NAC in a Local Area Network (LAN)
  • Understand the techniques and standards involved ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required