A network engineer is configuring network ports in a public office. To increase security, the engineer wants the ports to allow network connections only after authentication. Which of the following security features should the engineer use?
802.1X provides port-based Network Access Control (NAC). Ports remain in a blocked state until a device authenticates (usually with RADIUS). This is ideal for public or semi-public areas where ports should not be “always on.”
A. Port security restricts by MAC addresses but does not authenticate users.
C. MAC filtering is easily spoofed and weaker than 802.1X.
D. ACLs filter traffic but do not enforce port-based authentication.
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit