O'Reilly logo

Cisco Networking Simplified, Second Edition by Paul Della Maggiora, Neil Anderson, Jim Doherty

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter . Identity-Based Networking

Network Access Conundrum

Legacy networks typically operated under a model of allowing devices to be plugged into the network. As long as they could understand and communicate the basic protocols of OSI Layer 1 (physical layer) and Layer 2 (data link layer), they could get access to the network. The ease of plugging in and getting a “hot” Ethernet connection helped fuel the widespread adoption of networks and speeded the decline of other, more complex methods of connectivity.

Ease of use and security measures are often at odds with each other. The more restrictive network access policies are, often the more difficult it is for network users to jump through the right hoops to be granted access. Such is the quandary ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required