14.2. Exploring the NAP Enforcement Methods
How does each of the commonly used NAP enforcement methods quarantine a noncompliant computer? When you are evaluating a NAP deployment, this is the most important aspect to consider since it may require some network redesign or possibly the introduction of network authentication technologies that you may not have in place today.
14.2.1. 802.1x NAP (Wired or Wireless)
The 802.1x network authentication standard has been around since the mid-1990s and was defined to be used primarily in wireless networks as a means of port access control. 802.1x also allows secure Remote Authentication Dial In User Service (RADIUS) authentication between the client machine and a back-end RADIUS server.
To do 802.1x ...