Chapter 8. Identifying Who's On My Network

In This Chapter

  • Identifying your identity

  • Mapping out your users

Grasping identity and folding it into your network-access-control–based network can move your network into the next generation. Tie your network to your authentication servers to create a detailed view of your network and who has access to what. This view gives you something that you can see and control!

Get Network Access Control For Dummies® now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.