Chapter 17
TrustSec and MACsec
This chapter covers the following topics:
Throughout this book, you have been exposed to many different ways of controlling network access based on the context of a user and a device. With VLAN assignment, access is controlled at the Layer 3 edge or by isolating that VLAN into a segmented virtual network (VRF instances). In addition, with ACL assignment, a local ACL can be called into action by a RADIUS attribute or a downloadable ACL (dACL) can be used. Both of these types of ACLs are applied in the ingress direction at the switch port or at a virtual port ...
Get CCNP Security Identity Management SISE 300-715 Official Cert Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.