Network Port Security and Authentication Protocols

Deepdive

16-07-2025 • 20 mins

In this episode of DeepDive, XatusBetaZx17 breaks down how to lock down your network at the edge—covering port security on switches and 802.1X authentication for wired and wireless access. You’ll learn best practices for configuring port limits and MAC-based restrictions, see how authentication protocols grant or deny network access, and discover how these controls fit into a larger defense-in-depth strategy.Resources & Links:

Security Best Practices in Catalyst Campus Switches (Cisco PDF)
https://www.cisco.com/c/dam/global/fr_ca/assets/presentations/Security/Security_pratices_in_ethernet_Switched_networks.pdf Cisco
What Is 802.1X? How Does It Work? (SecureW2)
https://www.securew2.com/solutions/802-1x SecureW2
Choosing the Right Flavor of 802.1X (TechTarget)
https://www.techtarget.com/searchnetworking/feature/Choosing-the-right-flavor-of-8021X

• Subscribe & leave a review on Apple Podcasts, Spotify, or your favorite app! find me real sources for this please this is today episode


You Might Like

Darknet Diaries
Darknet Diaries
Jack Rhysider
Acquired
Acquired
Ben Gilbert and David Rosenthal
TechStuff
TechStuff
iHeartPodcasts
RNIB Tech Talk
RNIB Tech Talk
RNIB Connect Radio
This Week in Retro
This Week in Retro
Chris from 005 AGIMA, Jason from The Retro Adventurers, Dave and Duncan Styles
Hard Fork
Hard Fork
The New York Times
Talkin' Shop
Talkin' Shop
Eclipse Automotive Technology
FT Tech Tonic
FT Tech Tonic
Financial Times