Switches can be managed in many different ways. In this video, you’ll learn about unmanaged vs. managed switches, console connections, virtual terminals, in-band vs. out-of-band communication, and methods of authenticating administrators.
In many organizations, there are diverse devices that all need some type of standardized authentication methods. Fortunately, the IT industry has created these AAA methods using technologies such as RADIUS and TACACS.
During a normal day, we are constantly authenticating our user credentials to web sites, file servers, and other network resources. As with most technologies, there’s more than one way to perform these authentications. In this video, you’ll learn what’s happening over the wire and become familiar with PKI, Kerberos, AAA, network access control technologies, CHAP, EAP, and much more.