![]() ![]() Network-based enforcement itself can take many forms, including dedicated gateway, DHCP manipulation, 802.1x authentication, and port- and VLAN-based enforcement on switches. Some vendors enforce policies using a client agent, some enforce them in the network, and some even use peers for enforcement. ![]() The wide variety of so-called NAC (network access control) products on the market shows a broad range of thinking about policy-based security controls and the management of the network in general, including the end-point devices that connect to the network.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |