Chapter 8. Identifying Who's On My Network

In This Chapter

  • Identifying your identity

  • Mapping out your users

Grasping identity and folding it into your network-access-control–based network can move your network into the next generation. Tie your network to your authentication servers to create a detailed view of your network and who has access to what. This view gives you something that you can see and control!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.176.225