A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network. Which of the following should be configured on the existing network infrastructure to best prevent this activity?
A visitor plugs a laptop into a network jack in the lobby and is able to connect to the company's network. Which of the following should be configured on the existing network infrastructure to best prevent this activity?
To prevent unauthorized devices from connecting to the network via a physical port, port security should be configured on the network infrastructure. Port security restricts the use of a secure switch port to specific devices identified by their MAC address and can disable the port if an unauthorized device is connected. This helps in controlling physical access to the network and ensures only authorized devices can connect.
Port security / 802.1x / NAC
A. Port security