802.1X | Network Basics

preview_player
Показать описание
We're talking about 802.1x - the authentication mechanism we leverage to segment network access control and authentication of devices trying to access the network!

FOLLOW US:
Рекомендации по теме
Комментарии
Автор

Dude.. You are an incredibly gifted teacher. You made 802.1x so simple

nerdynerdface
Автор

Studying for my Security+ and this is clearer and more thorough than the entire section of the textbook dedicated to "explaining" 802.1x

zongzoogly
Автор

Straight to the point explanation. Now lets have a video of you configuring some of the scenarios you explained please

scott
Автор

I like how you make it simple to understand.

mohammedabdul-kader
Автор

background music is very noisy and distracting

mashailaziz
Автор

Amazing timeless explanation, thanks a lot!

cedkams
Автор

Wow this made perfect sense. Thank you, thank you, thank

WargamerNed
Автор

Thank You for that helpful explanation.

jewelminor
Автор

It would be a great video if the music was not that loud... But still, thanks for clear explanation!

EHASZz
Автор

Awesome Straight to the point explanation!!! Thank you very much!!! Keep these coming!!! Cheers!

samjones
Автор

I love your enthusiasm!!! I am studying for the CCNA right now! :)

og_ciscosuperman
Автор

I jumped out of my chair 3 times before I was 30 seconds into this video!!!

teacherrussell
Автор

My Corporate Company has just implemented the restriction of all devices unless the MAC Address is in a whitelist. So now when I setup a new laptop or desktop, I have to have the MAC Address added to this whitelist first. Honestly, it's a pain. I feel like now imaging a new device or reimaging an existing device or trying to update a bios, we have gone backwards as far as now having to add the mac address to a whitelist work...more time consuming. I wish my company would have had it setup so that if a non company laptap was connected to the network, it would take them to a guest internet access. But my question is, would this method eliminate the need to still have to have the mac address added to the whitelist?

jmfancy
Автор

your personal laptop wouldnt have a supplicant right? is that still a thing? in the conference room

thegreatkris
Автор

Thanks, excellent description of 802.1x

josephbegala
Автор

Let's say the NPS dies while a computer is connected. Where would I go to determine/configure the re-auth period (how can i see how often the supplicant retries to authenticate)? Is that on the switchport or the NPS server, or is it a windows specific value?

allsoulsknight
Автор

Hey, can you search for a user (associated with a specific port) using this protocol? (ex. Jhomes is on switch ## port ##)

pauljamieson
Автор

Don't make learning videos with music or instrument in the background mixed with the voice... it disturbs...

elmehdibenseddik
Автор

explanation of what steps are needed when manually implementing IEEE 802.1X on a network?

srywahyuni
Автор

Thank you for putting it in dummy terms!!!!

Doogy