
Sign up to save your podcasts
Or
In this episode of DeepDive, XatusBetaZx17 breaks down how to lock down your network at the edge—covering port security on switches and 802.1X authentication for wired and wireless access. You’ll learn best practices for configuring port limits and MAC-based restrictions, see how authentication protocols grant or deny network access, and discover how these controls fit into a larger defense-in-depth strategy.Resources & Links:
• Security Best Practices in Catalyst Campus Switches (Cisco PDF)
https://www.cisco.com/c/dam/global/fr_ca/assets/presentations/Security/Security_pratices_in_ethernet_Switched_networks.pdf Cisco
• What Is 802.1X? How Does It Work? (SecureW2)
https://www.securew2.com/solutions/802-1x SecureW2
• Choosing the Right Flavor of 802.1X (TechTarget)
https://www.techtarget.com/searchnetworking/feature/Choosing-the-right-flavor-of-8021X
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app! find me real sources for this please this is today episode
In this episode of DeepDive, XatusBetaZx17 breaks down how to lock down your network at the edge—covering port security on switches and 802.1X authentication for wired and wireless access. You’ll learn best practices for configuring port limits and MAC-based restrictions, see how authentication protocols grant or deny network access, and discover how these controls fit into a larger defense-in-depth strategy.Resources & Links:
• Security Best Practices in Catalyst Campus Switches (Cisco PDF)
https://www.cisco.com/c/dam/global/fr_ca/assets/presentations/Security/Security_pratices_in_ethernet_Switched_networks.pdf Cisco
• What Is 802.1X? How Does It Work? (SecureW2)
https://www.securew2.com/solutions/802-1x SecureW2
• Choosing the Right Flavor of 802.1X (TechTarget)
https://www.techtarget.com/searchnetworking/feature/Choosing-the-right-flavor-of-8021X
• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app! find me real sources for this please this is today episode