If you’re concerned about unauthorized devices gaining access to your network, then you may want to consider implementing NAC using 802.1X. In this video, you’ll learn about NAC and how the 802.1X standard can be used to authenticate users before giving them access to the network.
In a large network, the security of who connects to the network is an important consideration. In this video, you’ll learn how to secure your physical switch ports and how to use 802.1X for network access control.
Some fundamental physical port security best practices can help protect your network from unwanted systems. In this video, you’ll learn about MAC filtering, 802.1X features, and the importance of disabling unused ports.
During a normal day, we are constantly authenticating our user credentials to web sites, file servers, and other network resources. As with most technologies, there’s more than one way to perform these authentications. In this video, you’ll learn what’s happening over the wire and become familiar with PKI, Kerberos, AAA, network access control technologies, CHAP, EAP, and much more.