ABSTRACT
Amazingly enough, the title of this chapter explains what it is all about. This
chapter is intended to provide a basic foundation in the subject of Port-
Based Authentication that will be sufficient upon which to build a deeper
understanding. The way in which I will accomplish that is to provide three
sections in this chapter.