During a security audit, an administrator needs to ensure that only company-approved laptops can connect to the office's wired switches. Which network technology should be configured on each switch port so a user or device must successfully authenticate before any LAN or WLAN traffic is permitted?
Deploy a next-generation firewall module in each switch to filter traffic at Layer 7.
Create IPSec VPN tunnels between endpoints and the core router for secure connectivity.
Enable WPA3 encryption on the wired interfaces to secure all transmitted data.
Configure 802.1X authentication on the switch ports to require credentials before granting access.
IEEE 802.1X is a port-based network access-control protocol that works at the data-link layer. A supplicant (client) must authenticate through the switch (authenticator) to a backend RADIUS server before the port transitions from an unauthorized to an authorized state. This prevents unauthorized devices from gaining network access. 802.1X itself does not define encryption, provide VPN tunneling, or perform firewall functions-those are handled by other mechanisms.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
How does 802.1X differ from other authentication mechanisms like WPA2-Enterprise?
Open an interactive chat with Bash
What role does the RADIUS server play in 802.1X authentication?
Open an interactive chat with Bash
Which protocols are commonly used with 802.1X for device authentication?