Chapter 5

Authentication

Abstract

Authentication involves ensuring that the person logging on to the network is who he/she says they are. But authentication is one of those things that people take for granted. Building on the encryption standards, authentication has improved in a couple of different ways. First, before a port in an organization’s LAN is activated, port authentication using 802.1X protocols should be enforced. Once the device is plugged into an authenticated port, the user needs to be authenticated, preferably using 802.1X standards and protocols. So the device is authenticated by the user. User authentication involves possibly communicating with and exchanging credentials with an AAA server [Remote Authentication Dial-In ...

Get Securing VoIP now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.