Download now Free registration required
They require a mechanism that can verify the credentials of all those accessing their network and at the same time check authenticity of other network enterprises with which they are being connected. An identity based access to network not only increases security significantly but also reduces the move of Information Technology and change costs. This paper provides a detailed profile of Enter 802.1x which is a robust, extensible security framework having powerful authentication and data privacy capabilities. Having been field tested in Wireless Local Area Network (WLAN) - and many wired Local Area Network deployments for years, this mechanism has been accepted as a strong means of providing Network Access Control (NAC). The 802.1x standard works in conjunction with powerful and robust Extensible Authentication Protocol methods, the details of which are further mentioned in this paper. The Juniper Networks Unified Access Control integrates and draws on the 802.1x standard to supplement or substitute for an overlay deployment with firewalls, in order to deliver comprehensive NAC. Thus, Juniper through its high-performance network infrastructure attempts to create a responsive and trusted online environment.
- Format: PDF
- Size: 221.1 KB