Location Aware Networking

Being able to control network access based upon location is very desirable. For example it is common for students to be prohibited from unplugging organizational lab computers and plugging in their own laptops. As 802.1 X authentications identify the point at which the supplicant is trying to access the network, it is very easy to prevent groups of user computers from accessing the network in specific locations.

Furthermore with the accounting and logging provided by authentication servers, attempts to access the network in a prohibited manner can be logged and reported and if required users can be banned. Other examples include IT Service staff being given appropriate VLANs with elevated access rights.

Comment below or leave your enquiry, question, feedback below

Leave a Reply

Item added to cart.
0 items - R0.00
error: Please note copying is not allowed and not healthy for you. SayPro