Chapter . Identity-Based Networking

Network Access Conundrum

Legacy networks typically operated under a model of allowing devices to be plugged into the network. As long as they could understand and communicate the basic protocols of OSI Layer 1 (physical layer) and Layer 2 (data link layer), they could get access to the network. The ease of plugging in and getting a “hot” Ethernet connection helped fuel the widespread adoption of networks and speeded the decline of other, more complex methods of connectivity.

Ease of use and security measures are often at odds with each other. The more restrictive network access policies are, often the more difficult it is for network users to jump through the right hoops to be granted access. Such is the quandary ...

Get Cisco Networking Simplified, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.