ABSTRACT
So far we have gone through two chapters of the book that have discussed
what Port-Based Authentication grounded in 802.1X is, why it should be
implemented, the history of the specifications, and technical discussion of
the various elements involved in the authentication process. Everything
presented thus far has been directed toward developing a sound footing in
the technical functionality. This last chapter will be devoted to presenting a
practical view of authentication.