Browse by Tags

Tagged Content List
  • Blog Post: Using the FREE network security tools you get in Windows (and who doesn't love free tools?)

    In my last post I talked extensively about the use of 802.1x for network authentication (wired or wireless) and talked about the benefits of the 2 common approaches to controlling machine access (VLAN vs. Port ACL). While 802.1x remains a very popular mechanism for controlling port based access for machines...
  • Blog Post: Operating System Deployment in an 802.1x Environment

    For those that have investigated, or deployed 802.1x port authentication on either a wireless or a wired network understand the benefits and additional security that such a solution offers. The ability to stop traffic at layer 2, at the port is a powerful security measure and one that has been tested...