Company XYZ uses an office model where the employees can use any open desk and plug their laptops in. They want to authenticate the end users using their domain username and password before allowing them access to the network. The design must also accommodate the ability of controlling traffic within the same group or subnet if a macro (or micro) segmentation-based model is adopted in the future. Which protocol can be recommended for this design to authenticate end users?
kalulosu
4 months, 4 weeks agoSeawanderer
6 months, 3 weeks agoanonymousch
7 months agoskjs
10 months, 1 week agoJentti
1 year, 6 months agoAsaHung
1 year, 7 months agobdp123
1 year, 7 months agobdp123
1 year, 7 months agoAkkisingh
1 year, 7 months agoAkkisingh
1 year, 7 months agodongho
1 year, 8 months agogcpengineer
1 year, 9 months agopizdecvsemu
1 year, 9 months agogcpengineer
1 year, 9 months agobiddid2
1 year, 9 months agovn
2 years agoschwabenschulle
1 year, 9 months agobiddid2
1 year, 9 months ago