September 2017
Beginner to intermediate
436 pages
12h 33m
English
The users connect to the network through wireless networks or wired access ports. Authenticating and authorizing a user at the edge of the network is the most scalable way of managing security, as it allows policy to be enforced on a per user basis even before the user gains access to the network.
The IEEE 802.1x standard is used for authenticating users before they get access to the system and this is enforced by using products such as Cisco's Network Access Control (NAC). The Cisco NAC solution authenticates the users based on their user credentials and even the device types they are using, as well as the operating system versions, and any antivirus software versions, and so on, before the device is allowed ...