Listen "Network Port Security and Authentication Protocols"
Episode Synopsis
In this episode of DeepDive, XatusBetaZx17 breaks down how to lock down your network at the edge—covering port security on switches and 802.1X authentication for wired and wireless access. You’ll learn best practices for configuring port limits and MAC-based restrictions, see how authentication protocols grant or deny network access, and discover how these controls fit into a larger defense-in-depth strategy.Resources & Links:• Security Best Practices in Catalyst Campus Switches (Cisco PDF)https://www.cisco.com/c/dam/global/fr_ca/assets/presentations/Security/Security_pratices_in_ethernet_Switched_networks.pdf Cisco• What Is 802.1X? How Does It Work? (SecureW2)https://www.securew2.com/solutions/802-1x SecureW2• Choosing the Right Flavor of 802.1X (TechTarget)https://www.techtarget.com/searchnetworking/feature/Choosing-the-right-flavor-of-8021X • Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app! find me real sources for this please this is today episode
More episodes of the podcast Deepdive
Cloud Service Models and Vendor Management
24/08/2025
Cloud Deployment Models and Architectures
17/08/2025
Network Security: Strategic Device Placement
04/08/2025
Air-Gapped Systems_ Security and Management
21/07/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.