Deepdive

Network Port Security and Authentication Protocols


Listen Later

In this episode of DeepDive, XatusBetaZx17 breaks down how to lock down your network at the edge—covering port security on switches and 802.1X authentication for wired and wireless access. You’ll learn best practices for configuring port limits and MAC-based restrictions, see how authentication protocols grant or deny network access, and discover how these controls fit into a larger defense-in-depth strategy.Resources & Links:

Security Best Practices in Catalyst Campus Switches (Cisco PDF)
https://www.cisco.com/c/dam/global/fr_ca/assets/presentations/Security/Security_pratices_in_ethernet_Switched_networks.pdf Cisco
What Is 802.1X? How Does It Work? (SecureW2)
https://www.securew2.com/solutions/802-1x SecureW2
Choosing the Right Flavor of 802.1X (TechTarget)
https://www.techtarget.com/searchnetworking/feature/Choosing-the-right-flavor-of-8021X

• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app! find me real sources for this please this is today episode


...more
View all episodesView all episodes
Download on the App Store

DeepdiveBy Xatusbetazx17