Statements (96)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:standard
gptkb:XMPP_Extension_Protocol |
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:RADIUS
|
gptkbp:applies_to |
Wireless Networks
Wired Networks |
gptkbp:can_be_used_with |
gptkb:RADIUS
gptkb:TACACS+ Biometric Authentication Smart Cards VP Ns 802.1 AE (MA Csec) 802.1 Q (VLAN tagging) |
gptkbp:defines |
gptkb:standard
gptkb:IEEE_802.1_X-2010 gptkb:IEEE_802.1_X-2017 IEEE 802.1 Standard |
gptkbp:developed_by |
gptkb:API
|
gptkbp:enables |
gptkb:Company
Guest Access Control |
gptkbp:enforces |
User Authentication
|
gptkbp:enhances |
gptkb:software
|
https://www.w3.org/2000/01/rdf-schema#label |
802.1 X
|
gptkbp:integrates_with |
gptkb:film_production_company
gptkb:LDAP |
gptkbp:is_compatible_with |
I Pv6
I Pv4 VP Ns (Virtual Private Networks) |
gptkbp:is_implemented_in |
gptkb:musician
Firewalls Routers Access Points Wireless Controllers Enterprise Switches Network Interface Cards (NI Cs) |
gptkbp:is_part_of |
gptkb:Company
gptkb:television_channel gptkb:IEEE_802_family Enterprise Security Solutions Identity Management Systems Network Security Framework Network Security Policies IEEE 802 Standards Network Access Control Systems Network Access Control Solutions Access Control Frameworks Zero Trust Security Models |
gptkbp:is_protected_by |
Unauthorized Access
|
gptkbp:is_related_to |
gptkb:Network_Policy_Server_(NPS)
gptkb:Company Access Point Configuration Network Security Policies Access Control Lists (AC Ls) Client Authentication Methods Network Access Control Protocols |
gptkbp:is_standardized_by |
gptkb:802.1_X
|
gptkbp:is_supported_by |
gptkb:Windows_Operating_System
gptkb:smartphone gptkb:Linux_Operating_System Network Operating Systems Security Information and Event Management (SIEM) Systems Network Hardware Manufacturers |
gptkbp:is_used_by |
gptkb:Educational_Institution
Enterprise Networks Public Wi-Fi Networks |
gptkbp:is_used_for |
Compliance Requirements
User Authentication Guest Network Access Device Authentication Secure Network Access Corporate Network Access Io T Device Security |
gptkbp:is_used_in |
Data Centers
Enterprise Networks Cloud Environments Corporate Environments Campus Networks Public Wi-Fi Networks |
gptkbp:is_used_to |
Control Network Access
|
gptkbp:provides |
Authentication
Port-based network access control |
gptkbp:requires |
Client Software
Authentication Server |
gptkbp:security_features |
LAN (Local Area Network)
WLAN (Wireless Local Area Network) |
gptkbp:setting |
gptkb:XMPP_Extension_Protocol
Multiple Authentication Methods VLA Ns (Virtual Local Area Networks) |
gptkbp:specifies |
Port-based Network Access Control
|
gptkbp:supports |
Single Sign-On
Dynamic VLAN assignment EAP (Extensible Authentication Protocol) |
gptkbp:used_in |
Wireless Networks
Wired Networks |
gptkbp:uses |
EAP (Extensible Authentication Protocol)
|
gptkbp:works_with |
RADIUS (Remote Authentication Dial In User Service)
|