Published On Premiered Aug 27, 2021
In this video Travis compares the layer 2 security techniques of port security and port based authentication. He discusses the different ways to implement MAC address filtering as well as the benefits and draw backs. He compares port security to authenticating users on a port by port basis. The most common way to filter and authenticate users in this way is 802.1x. He finishes by discussing the technologies that allow 802.1x: PAP, CHAP, EAP and RADIUS.
Links from the show:
https://packetlife.net/captures/proto...
► Stay in touch!
Follow: / travisiq
Website: https://intelligencequest.com/
Instagram: / travis_iq
Linkedin: / traviswentworthiq
show more