ABSTRACT

So far we have gone through two chapters of the book that have discussed

what Port-Based Authentication grounded in 802.1X is, why it should be

implemented, the history of the specifications, and technical discussion of

the various elements involved in the authentication process. Everything

presented thus far has been directed toward developing a sound footing in

the technical functionality. This last chapter will be devoted to presenting a

practical view of authentication.