40 likes | 151 Views
This document by Klaas Wierenga from SURFnet delves into core assumptions about network security protocols, focusing on the practical differences between WEP and non-WEP configurations. It covers essential components such as web security, 802.1X authentication, and VPN configurations, alongside the critical RADIUS infrastructure. It includes in-depth examples of configuration that illustrate interworking solutions for networks encountering IEEE 802.1Q challenges, making it an important resource for networking professionals and system administrators.
E N D
TF-Mobility deliverable H Klaas Wierenga SURFnet Klaas.Wierenga@SURFnet.nl
Assumptions • Theory covered in Del G • Practical document • Local • WEP vs non-WEP • Web, 802.1X, VPN configuration • Backbone • RADIUS infra • CASG • Configuration examples