Security

ID Control

RenĂ© Jorissen on June 19, 2008 0 Comments • Tags: #handyid #idcontrol #keystrokeid #manager #password #pki #rsa #secure #securid #strongauthentication #usbtoken #vpn #whatyouare #whatyouhave #whatyouknow

Ictivity received via via an e-mail about strong authentication products from ID Control. Strong authentication is authentication were you need multiple factors (what you have, what you know, what you are) to actual authenticate to a system, network or something else. We, as Connectivity Consultant, were asked to look at the different products and start … Read More

Configuration Example, Security

MAC Authentication Bypass

RenĂ© Jorissen on June 17, 2008 0 Comments • Tags: #8021x #authenticate #bypass #caveats #guest-vlan #mac #nac #nap

NAC (for Cisco – Network Admission Control) or NAP (for Microsoft – Network Access Protection) in conjunction with 802.1x will be standard for authenticating network components and allowing them access to the network. At least in the future. Currently their aren’t a lot of companies how are using NAC in the network. Techworld released an … Read More