O'Reilly logo

Mastering System Center Configuration Manager 2007 R2 by Christopher W. Urban, Ron D. Crumbaker, Chris Mosby

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

14.2. Exploring the NAP Enforcement Methods

How does each of the commonly used NAP enforcement methods quarantine a noncompliant computer? When you are evaluating a NAP deployment, this is the most important aspect to consider since it may require some network redesign or possibly the introduction of network authentication technologies that you may not have in place today.

14.2.1. 802.1x NAP (Wired or Wireless)

The 802.1x network authentication standard has been around since the mid-1990s and was defined to be used primarily in wireless networks as a means of port access control. 802.1x also allows secure Remote Authentication Dial In User Service (RADIUS) authentication between the client machine and a back-end RADIUS server.

To do 802.1x ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required