Shared Access

Places where you cannot ensure the security of the Ethernet ports should be the prime reason for deplo 802.1x. A lobby at your organization could use 802.1x to allow legitimate users access to the organizati network, while unauthorized users are given no access or are put on a VLAN that provides basic Interne only. This design is shown in Figure 9-7. Until such issues as MAC spoofing attacks are addressed in the you still must require crypto of some kind before allowing users to connect internally.

Figure 9-7. 802.1x/EAP Shared Access Deployment

Figure 9-7. 802.1x/EAP Shared Access Deployment

100 SEO Tips

100 SEO Tips

100 SEO Tips EVERY SEO Enthusiast Should Know. This Report 100 SEO Tips will help you to Utilize These Tips to Dominate The Search Engine Today.

Get My Free Ebook


Post a comment