作者: Roger A. Chickering
DOI:
关键词: Layer (object-oriented design) 、 Communication endpoint 、 Provisioning 、 Node (networking) 、 Computer network 、 Computer science 、 Network layer 、 Identification (information) 、 Authentication
摘要: A method may include obtaining a layer two identification of an endpoint that is seeking access to network, the omitting agent communicate three address policy node, applying one or more authentication rules based on endpoint, assigning learning, by and provisioning for network learned address.