Identity-Aware Networking

Identity-Aware Networking

Cover

When you think about identity management, what comes to mind? Probably things like LDAP directories, strong authentication, and Single Sign-On (SSO) systems. In general, these technologies are used for access to Windows networks, e-mail, and other internal applications. Of course, network pipes provide the actual infrastructure for these application layer communications, but network identity is far more elementary than application-layer activity. Generally, network identity is associated with things like IP and MAC addresses, VLAN tags, and subnets. It also plays a role in security in areas like device authentication, VPNs, and IPSEC.

Vendor:
Extreme Networks
Posted:
02 Dec 2010
Published
02 Dec 2010
Format:
PDF
Length:
8 Page(s)
Type:
White Paper
Language:
English
Already a Bitpipe member? Login here

Download this White Paper!

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy