O'Reilly logo

Securing VoIP by Regis Jr Bates

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5

Authentication

Abstract

Authentication involves ensuring that the person logging on to the network is who he/she says they are. But authentication is one of those things that people take for granted. Building on the encryption standards, authentication has improved in a couple of different ways. First, before a port in an organization’s LAN is activated, port authentication using 802.1X protocols should be enforced. Once the device is plugged into an authenticated port, the user needs to be authenticated, preferably using 802.1X standards and protocols. So the device is authenticated by the user. User authentication involves possibly communicating with and exchanging credentials with an AAA server [Remote Authentication Dial-In ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required