before reading this comment i didn't even recognize that there is a background music and after reading this msg i can only hear the music not his voice you just ruined by concentration buddy
My Corporate Company has just implemented the restriction of all devices unless the MAC Address is in a whitelist. So now when I setup a new laptop or desktop, I have to have the MAC Address added to this whitelist first. Honestly, it's a pain. I feel like now imaging a new device or reimaging an existing device or trying to update a bios, we have gone backwards as far as now having to add the mac address to a whitelist first.....more work...more time consuming. I wish my company would have had it setup so that if a non company laptap was connected to the network, it would take them to a guest internet access. But my question is, would this method eliminate the need to still have to have the mac address added to the whitelist?
Let's say the NPS dies while a computer is connected. Where would I go to determine/configure the re-auth period (how can i see how often the supplicant retries to authenticate)? Is that on the switchport or the NPS server, or is it a windows specific value?
The exam prep book says it uses RADIUS to authenticate a device. EAP is one of the options in the multiple choice, though. Can someone please clarify this so I don’t look estupido?
What’s the difference between 802.1x and EAP? Can they work without each other? Can 802.1x work without RADIUS or another AAA server? And can RADIUS/AAA work without 802.1x?
802.1x is a network access authentication framework. RADIUS and EAP are critical components of this framework. In short, 802.1x will not work without RADIUS or EAP. This being said, you have your choice of vendor to use across the 802.1x architecture for each of these components involved as 802.1x and all of its sub-components are an open standard. Take a look here for a primer on the components involved in an 802.1x architecture. www.lookingpoint.com/blog/ise-series-802.1x
Dude.. You are an incredibly gifted teacher. You made 802.1x so simple
Studying for my Security+ and this is clearer and more thorough than the entire section of the textbook dedicated to "explaining" 802.1x
That is great to hear! Thank you for watching! :)
Did you pass?
background music is very noisy and distracting
before reading this comment i didn't even recognize that there is a background music and after reading this msg i can only hear the music not his voice you just ruined by concentration buddy
Straight to the point explanation. Now lets have a video of you configuring some of the scenarios you explained please
I'm learning more than I want
It would be a great video if the music was not that loud... But still, thanks for clear explanation!
Amazing timeless explanation, thanks a lot!
Good stuff, thanks.
I like how you make it simple to understand.
We are so glad you think so! Thank you for watching :)
Wow this made perfect sense. Thank you, thank you, thank you!!!!!!!!!
I jumped out of my chair 3 times before I was 30 seconds into this video!!!
Incredible! Well done!
Awesome Straight to the point explanation!!! Thank you very much!!! Keep these coming!!! Cheers!
Thank You for that helpful explanation.
Love the use of simple exemples
I love your enthusiasm!!! I am studying for the CCNA right now! :)
Thank you for the support! Good luck! :)
Did you get CCNA?
Is it harder than Security+?
@@omicronceti6063 CCNA is pretty easy if you study for 2hrs a day for 20 days. I cracked it that way.
My Corporate Company has just implemented the restriction of all devices unless the MAC Address is in a whitelist. So now when I setup a new laptop or desktop, I have to have the MAC Address added to this whitelist first. Honestly, it's a pain. I feel like now imaging a new device or reimaging an existing device or trying to update a bios, we have gone backwards as far as now having to add the mac address to a whitelist first.....more work...more time consuming. I wish my company would have had it setup so that if a non company laptap was connected to the network, it would take them to a guest internet access. But my question is, would this method eliminate the need to still have to have the mac address added to the whitelist?
Let's say the NPS dies while a computer is connected. Where would I go to determine/configure the re-auth period (how can i see how often the supplicant retries to authenticate)? Is that on the switchport or the NPS server, or is it a windows specific value?
explanation of what steps are needed when manually implementing IEEE 802.1X on a network?
Don't make learning videos with music or instrument in the background mixed with the voice... it disturbs...
your personal laptop wouldnt have a supplicant right? is that still a thing? in the conference room
Thanks, excellent description of 802.1x
Thank you for watching! We appreciate the support!
Loved it! Thank you for sharing :)
Thank you so much for watching! :)
Great, many thanks.
Hey, can you search for a user (associated with a specific port) using this protocol? (ex. Jhomes is on switch ## port ##)
great thanks!
😁
What does eap stand for?
Thank you for putting it in dummy terms!!!!
The exam prep book says it uses RADIUS to authenticate a device. EAP is one of the options in the multiple choice, though. Can someone please clarify this so I don’t look estupido?
It’s the LAN, isn’t it...?
What’s the difference between 802.1x and EAP? Can they work without each other? Can 802.1x work without RADIUS or another AAA server? And can RADIUS/AAA work without 802.1x?
802.1x is a network access authentication framework. RADIUS and EAP are critical components of this framework. In short, 802.1x will not work without RADIUS or EAP. This being said, you have your choice of vendor to use across the 802.1x architecture for each of these components involved as 802.1x and all of its sub-components are an open standard. Take a look here for a primer on the components involved in an 802.1x architecture. www.lookingpoint.com/blog/ise-series-802.1x
@@lookingpointinc Thanks!
HI
Pls make a TCP/IP complete Work flow video with example from TAC point of view
Great explanation
Thanks for watching! :)
Why is mine switched off?
You forgot to mention the background music is NOT necessary for any learning Protocall's.
Thank u... What are examples of 802.1X please ?
Thanks for the explanation. Please make a video on how we can configure Radius in Airport time capsule.
Thanks for the feedback! We will add it to the list!
Why the background music, thank you though!!
Loving the dre/storch style beat..got this on loop with a lil head-bop while learning 802.1X
thanks
The background music is killing my concentration :(
Would have otherwise been a thumbs up
Nice video, but the music is way too loud
What happened your music volume..... it’s too high than your voice
Great video but the pop music is SO distracting in the background and loud. Like my dude is trying to talk details and all I hear is dance music lol.
that was great
ok thank
Good info. Lose the music.
You'll never know as much as an Apple software engineer. Those guys are smart and my dog has better ethics
Should we listen to you or the music 😅, bg music is not necessary I guess
How do I find my username and password for 802.1x
Same problem!
If DHCP is on auto good luck
the music is so annoying !!!
Dr DRE and Scott Storch would enjoy this video... 25 seconds onwards
0:10 LOL
dude you're into was so loud and annoying
Waste of time video. This guy talks way too much, and the music is too loud. No graphics - just this guy talking.
Please remove background music
Eh. Too intense for me.
dont talllk justt showw what you want TO SAYYYY WITH IMPLEMANTION
thanks