Journal Journal: Network Machine Authentication
Ideas about network machine authentication...
machine auth and the process of attaching to the network - how does that work?
machine auth outcomes. 802.1X says that the device doesnot connect but the port is checked again at some later interval to see if it "got better".
Might you want to just turn the port off until the device is removed? How can we tell a device was removed?
If a device can't auth might we want to do something other than just block? Maybe allow Inet access? Maybe allow access to a proxy server or secondary means of authenticating?
Links to articles about network machine authentication
Products in the machine auth market space....