Statements (59)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:standard
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:802.1_X
|
gptkbp:applies_to |
LAN (Local Area Network)
|
gptkbp:communication |
Port-based Network Access Control
|
gptkbp:defines |
gptkb:IEEE_802.1_working_group
Client-server authentication model |
gptkbp:enables |
Dynamic VLAN assignment
Endpoint compliance checking |
gptkbp:enhances |
Network security
|
gptkbp:facilitates |
Guest access management
|
https://www.w3.org/2000/01/rdf-schema#label |
IEEE 802.1 X-2010
|
gptkbp:improves |
gptkb:XMPP_Extension_Protocol
|
gptkbp:is_adopted_by |
gptkb:Educational_Institution
Cloud security Remote work security Io T device security |
gptkbp:is_compatible_with |
I Pv4 and I Pv6
802.1 AE (MA Csec) |
gptkbp:is_documented_in |
gptkb:IEEE_Xplore_Digital_Library
|
gptkbp:is_implemented_in |
Network security appliances
Access control servers Switches and wireless access points Wireless LAN controllers |
gptkbp:is_part_of |
Network security protocols
Enterprise security architecture IEEE 802 family of standards Access control frameworks Zero Trust security models |
gptkbp:is_related_to |
Network access control solutions
802.1 Q (VLAN tagging) 802.11 wireless standards 802.3 Ethernet standards Network access control lists (AC Ls) |
gptkbp:is_standardized_by |
gptkb:IEEE_Standards_Association
Network access control |
gptkbp:is_supported_by |
Security information and event management (SIEM) systems
Network operating systems Network hardware manufacturers |
gptkbp:is_used_by |
Enterprises and organizations
|
gptkbp:is_used_for |
Network segmentation
Secure network access Access control in enterprise networks |
gptkbp:is_used_in |
Corporate networks
|
gptkbp:is_utilized_in |
VPN services
Public Wi-Fi networks Managed service providers |
gptkbp:provides |
User identity protection
Authentication mechanism |
gptkbp:published_by |
gptkb:Institute_of_Electrical_and_Electronics_Engineers
|
gptkbp:related_to |
RADIUS (Remote Authentication Dial In User Service)
|
gptkbp:release_date |
gptkb:2010
|
gptkbp:replaced_by |
IEEE 802.1 X-2004
|
gptkbp:requires |
Authentication server
|
gptkbp:specifies |
Access control policies
|
gptkbp:supports |
Multiple authentication methods
EAP (Extensible Authentication Protocol) |
gptkbp:used_in |
Wired and wireless networks
|
gptkbp:utilizes |
Supplicants and authenticators
|