Chapter 5



Authentication involves ensuring that the person logging on to the network is who he/she says they are. But authentication is one of those things that people take for granted. Building on the encryption standards, authentication has improved in a couple of different ways. First, before a port in an organization’s LAN is activated, port authentication using 802.1X protocols should be enforced. Once the device is plugged into an authenticated port, the user needs to be authenticated, preferably using 802.1X standards and protocols. So the device is authenticated by the user. User authentication involves possibly communicating with and exchanging credentials with an AAA server [Remote Authentication Dial-In ...

Get Securing VoIP now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.