Authenticating users and devices is important in order to prevent unauthorized connections to your network; wired
or wireless. Most home WLANs don’t need extensive authentication measures other than MAC address filtering
(see Wireless 101 page). Organizations that require widespread access to their wireless networks from a variety
of users and computers require more advanced authentication technologies.
In the world of IT, the AAA security model represents the following: Authentication is who you are, Authorization
is what you are allowed to do and Accounting is what you actually did (also called Auditing).
802.1X
TechWeb DefinesTechNet Explains
Port Access Control
Deployment  (NetworkComputing)
Deployment  (Wi-Fi Planet)
Open Source Download
_______________________________________________________________________________________________
RADIUS  (Remote Authentication Dial In User Service)
RADIUS Defined  (assumes pre-existing knowledge of network protocols, etc)Tutorial
IAS RADIUS
Cisco RADIUS
WhitePaper  (TechRepublic)
_______________________________________________________________________________________________
EAP  (Extensible Authentication Protocol)
EAP DefinedEAP Methods
Enabling EAP
Configuring EAP  (Cisco)