ABSTRACT

Amazingly enough, the title of this chapter explains what it is all about. This

chapter is intended to provide a basic foundation in the subject of Port-

Based Authentication that will be sufficient upon which to build a deeper

understanding. The way in which I will accomplish that is to provide three

sections in this chapter.