This chapter covers the following topics:
Implement wired/wireless 802.1X
As discussed in Chapter 9, “Authentication Policies,” an authentication is the validation of a credential or an identity. The other major portion of secure network access control is the control portion. Authorization validates the level of entitlement or access that should be granted. That is where authorization policies come in.
Consider a bank example: Walk into a bank and provide a government-issued passport as identification. It checks out completely, the seal is valid, and the picture matches, so there ...