Hi all! Back again. In my last blog (which admittedly was a bit long, and verbose) I discussed the changing landscape of Identity Networking. With Identity Networking there are many different ways of controlling network access based on the context of a user and device. There is: VLAN assignment, in which access is controlled at … Continue reading Security Group Tagging Basics
You must be logged in to post a comment.