{"id":14377,"date":"2025-10-20T00:02:22","date_gmt":"2025-10-19T21:02:22","guid":{"rendered":"https:\/\/www.inetmar.com\/blog\/?p=14377"},"modified":"2025-10-20T10:26:46","modified_gmt":"2025-10-20T07:26:46","slug":"802-1x-nedir","status":"publish","type":"post","link":"https:\/\/www.inetmar.com\/blog\/802-1x-nedir\/","title":{"rendered":"802.1x Nedir?"},"content":{"rendered":"<p>Dijital d\u00fcnyada a\u011f g\u00fcvenli\u011fi verileri korumak i\u00e7in olmazsa olmazd\u0131r. \u015eirketlerden okullara, hastanelerden kafelerdeki Wi-Fi a\u011flar\u0131na kadar her yerde sa\u011flam bir g\u00fcvenlik sistemi gerekir. 802.1x a\u011fa kimlerin girebilece\u011fini kontrol eden bir teknoloji olarak bu i\u015fi halleder. Ne oldu\u011fu, nas\u0131l \u00e7al\u0131\u015ft\u0131\u011f\u0131 ve neden \u00f6nemli oldu\u011fu a\u015fa\u011f\u0131da a\u00e7\u0131klanm\u0131\u015ft\u0131r.<\/p>\r\n<h2>802.1x Nedir?<\/h2>\r\n<p>802.1x bir IEEE standard\u0131 olarak a\u011fa ba\u011flanmak isteyen cihazlar\u0131n ya da kullan\u0131c\u0131lar\u0131n kimli\u011fini kontrol eder. Yani a\u011fa girmek isteyen herkes \u00f6nce kendini tan\u0131tmak zorundad\u0131r. Bu sayede sadece yetkili olanlar a\u011fa ba\u011flanabilir. Kablolu veya kablosuz a\u011flarda kullan\u0131lan bu sistem, yetkisiz giri\u015fleri engelleyerek g\u00fcvenli\u011fi art\u0131r\u0131r.<br \/><br \/><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-14384 size-full\" src=\"https:\/\/www.inetmar.com\/blog\/wp-content\/uploads\/2025\/06\/gorselx.png\" alt=\"802.1x\" width=\"1536\" height=\"1024\" srcset=\"https:\/\/www.inetmar.com\/blog\/wp-content\/uploads\/2025\/06\/gorselx.png 1536w, https:\/\/www.inetmar.com\/blog\/wp-content\/uploads\/2025\/06\/gorselx-300x200.png 300w, https:\/\/www.inetmar.com\/blog\/wp-content\/uploads\/2025\/06\/gorselx-1024x683.png 1024w, https:\/\/www.inetmar.com\/blog\/wp-content\/uploads\/2025\/06\/gorselx-768x512.png 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/><\/p>\r\n<h2>802.1x Nas\u0131l \u00c7al\u0131\u015f\u0131r?<\/h2>\r\n<p>Sistem \u00fc\u00e7 temel par\u00e7adan olu\u015fur:<\/p>\r\n<ul>\r\n<li><strong>\u0130stemci:<\/strong> A\u011fa ba\u011flanmak isteyen cihazd\u0131r; mesela bir laptop, telefon ya da IoT cihaz\u0131.<\/li>\r\n<li><strong>Kimlik Do\u011frulay\u0131c\u0131:<\/strong> A\u011fa eri\u015fimi kontrol eden cihazd\u0131r; genellikle bir Wi-Fi eri\u015fim noktas\u0131 ya da a\u011f anahtar\u0131.<\/li>\r\n<li><strong>Kimlik Do\u011frulama Sunucusu:<\/strong> Kimlik bilgilerini kontrol eden sunucudur; \u00e7o\u011fu zaman RADIUS protokol\u00fc kullan\u0131l\u0131r.<\/li>\r\n<\/ul>\r\n<p>\u0130\u015fleyi\u015f \u015fu \u015fekildedir:<\/p>\r\n<ol>\r\n<li>Cihaz a\u011fa ba\u011flanmak istedi\u011finde bir istek yollar.<\/li>\r\n<li>Kimlik do\u011frulay\u0131c\u0131, cihazdan kullan\u0131c\u0131 ad\u0131, parola ya da sertifika gibi bilgileri ister.<\/li>\r\n<li>Bu bilgiler sunucuya gider.<\/li>\r\n<li>Sunucu bilgileri kontrol eder ve eri\u015fime izin verip vermeyece\u011fine karar verir.<\/li>\r\n<li>E\u011fer her \u015fey yolundaysa, a\u011f portu a\u00e7\u0131l\u0131r ve cihaz ba\u011flan\u0131r.<\/li>\r\n<\/ol>\r\n<p>Bu y\u00f6ntem h\u0131zl\u0131 ve g\u00fcvenli bir \u015fekilde sadece do\u011fru cihazlar\u0131n a\u011fa girmesini sa\u011flar.<\/p>\r\n<h2>802.1x Avantajlar\u0131<\/h2>\r\n<p>Bu sistem a\u011flar\u0131 korumak i\u00e7in birka\u00e7 \u00f6nemli fayda sa\u011flar:<\/p>\r\n<ul>\r\n<li><strong>G\u00fcvenlik:<\/strong> Yetkisiz cihazlar\u0131n a\u011fa girmesini engelleyerek veri s\u0131z\u0131nt\u0131lar\u0131n\u0131 \u00f6nler.<\/li>\r\n<li><strong>Esneklik:<\/strong> Kablolu ya da kablosuz, her t\u00fcrl\u00fc cihazla \u00e7al\u0131\u015f\u0131r.<\/li>\r\n<li><strong>Kolay Y\u00f6netim:<\/strong> Eri\u015fim kurallar\u0131 tek bir yerden kontrol edilir.<\/li>\r\n<li><strong>\u00d6zelle\u015ftirme:<\/strong> Her kullan\u0131c\u0131 ya da cihaza farkl\u0131 eri\u015fim haklar\u0131 verilebilir.<\/li>\r\n<li><strong>Uyumluluk:<\/strong> IEEE standard\u0131 oldu\u011fu i\u00e7in \u00e7o\u011fu cihazla sorunsuz \u00e7al\u0131\u015f\u0131r.<\/li>\r\n<\/ul>\r\n<h2>802.1x Nerelerde Kullan\u0131l\u0131r?<\/h2>\r\n<p>Bu teknoloji g\u00fcvenli\u011fin \u00f6nemli oldu\u011fu bir\u00e7ok yerde kar\u015f\u0131m\u0131za \u00e7\u0131kar:<\/p>\r\n<ul>\r\n<li><strong>\u015eirketler:<\/strong> \u00c7al\u0131\u015fanlar\u0131n ve misafirlerin a\u011f eri\u015fimini d\u00fczenler.<\/li>\r\n<li><strong>Okullar:<\/strong> \u00d6\u011frenci ve personel cihazlar\u0131n\u0131 korur.<\/li>\r\n<li><strong>Hastaneler:<\/strong> Hasta bilgilerinin g\u00fcvenli\u011fini sa\u011flar.<\/li>\r\n<li><strong>Kamu Wi-Fi\u2019leri:<\/strong> Havalimanlar\u0131, oteller ya da kafelerde g\u00fcvenli ba\u011flant\u0131 sunar.<\/li>\r\n<\/ul>\r\n<h2>802.1x Kurulumu ve Dikkat Edilmesi Gerekenler<\/h2>\r\n<p>Kurulum i\u00e7in \u015fu ad\u0131mlar izlenir:<\/p>\r\n<ol>\r\n<li><strong>RADIUS Sunucusu:<\/strong> Kimlik kontrol\u00fc i\u00e7in bir <a href=\"https:\/\/www.inetmar.com\/sunucu\/\" target=\"_blank\" rel=\"noopener\">sunucu<\/a> kurulur; \u00f6rne\u011fin FreeRADIUS ya da Microsoft NPS.<\/li>\r\n<li><strong>A\u011f Cihazlar\u0131:<\/strong> Eri\u015fim noktalar\u0131 ve anahtarlar 802.1x i\u00e7in ayarlan\u0131r.<\/li>\r\n<li><strong>Cihaz Ayarlar\u0131:<\/strong> Kullan\u0131c\u0131 cihazlar\u0131na sertifikalar ya da kimlik bilgileri y\u00fcklenir.<\/li>\r\n<li><strong>Kurallar:<\/strong> Hangi cihazlar\u0131n neye eri\u015fece\u011fi belirlenir.<\/li>\r\n<\/ol>\r\n<p>Kurarken \u015funlara dikkat edilmelidir:<\/p>\r\n<ul>\r\n<li><strong>Zorluk:<\/strong> K\u00fc\u00e7\u00fck a\u011flarda kurulum biraz zaman alabilir.<\/li>\r\n<li><strong>Sertifikalar:<\/strong> Bunlar\u0131n d\u00fczenli g\u00fcncellenmesi gerekir.<\/li>\r\n<li><strong>Uyumluluk:<\/strong> Her cihaz\u0131n 802.1x\u2019i destekledi\u011fi kontrol edilmelidir.<\/li>\r\n<\/ul>\r\n<ul class=\"wp-block-latest-posts__list wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.inetmar.com\/blog\/cve-2026-32993-cpanel-whm-kritik-guvenlik-acigi-ve-cozum-rehberi\/\">CVE-2026-32993: cPanel &#038; WHM Kritik G\u00fcvenlik A\u00e7\u0131\u011f\u0131 ve \u00c7\u00f6z\u00fcm Rehberi<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.inetmar.com\/blog\/ssh-putty-baglantisi-nasil-yapilir-adim-adim-kurulum-rehberi\/\">SSH PuTTY Ba\u011flant\u0131s\u0131 Nas\u0131l Yap\u0131l\u0131r? (Ad\u0131m Ad\u0131m Kurulum Rehberi)<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.inetmar.com\/blog\/uzak-masaustu-baglantisi-rdp-nasil-yapilir-2026-rehberi\/\">Uzak Masa\u00fcst\u00fc Ba\u011flant\u0131s\u0131 (RDP) Nas\u0131l Yap\u0131l\u0131r? (2026 Rehberi)<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.inetmar.com\/blog\/linux-kernelda-kritik-dirty-frag-zafiyeti-tespit-edildi\/\">Linux Kernel&#8217;da Kritik &#8220;Dirty Frag&#8221; Zafiyeti Tespit Edildi!<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"https:\/\/www.inetmar.com\/blog\/cve-2026-23918-cvss-8-8\/\">Apache HTTP Sunucular\u0131nda Kritik RCE Zafiyeti! CVE-2026-23918 (CVSS: 8.8)<\/a><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>Dijital d\u00fcnyada a\u011f g\u00fcvenli\u011fi verileri korumak i\u00e7in olmazsa olmazd\u0131r. \u015eirketlerden okullara, hastanelerden kafelerdeki Wi-Fi a\u011flar\u0131na kadar her yerde sa\u011flam bir g\u00fcvenlik sistemi gerekir. 802.1x a\u011fa kimlerin girebilece\u011fini kontrol eden bir teknoloji olarak bu i\u015fi halleder.&#46;&#46;&#46;<\/p>\n","protected":false},"author":2,"featured_media":14380,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[52],"tags":[],"class_list":["post-14377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guvenlik"],"_links":{"self":[{"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/posts\/14377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/comments?post=14377"}],"version-history":[{"count":6,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/posts\/14377\/revisions"}],"predecessor-version":[{"id":14386,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/posts\/14377\/revisions\/14386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/media\/14380"}],"wp:attachment":[{"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/media?parent=14377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/categories?post=14377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inetmar.com\/blog\/wp-json\/wp\/v2\/tags?post=14377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}