March 2026
Intermediate to advanced
400 pages
15h 45m
English
Secure and accurate authentication of users is a critical component of the Zero Trust architecture. This section will cover the 802.1X standard and Extensible Authentication Program (EAP) methods used by access points (and switches) to control access to the network while the user authenticates to the RADIUS server. 802.1X controls port access (via an access point or switch) by requiring a user to authenticate before granting network access. 802.1X relies on EAP to create an encrypted tunnel between the client and authentication server to send authentication credentials.
The IEEE 802.1X standard specifies port-based Network Access Control (NAC) for LANs and wireless LANs (WLANs). 802.1X is ...
Read now
Unlock full access