If you’re concerned about unauthorized devices gaining access to your network, then you may want to consider implementing NAC using 802.1X. In this video, you’ll learn about NAC and how the 802.1X standard can be used to authenticate users before giving them access to the network.
<< Previous Video: An Overview of AAA, RADIUS, and TACACSNext: CHAP and MS-CHAP >>