Frontpage
Back
Navigation
Figure 2
«
Previous
|
Segmenting networks with VLANs
|
Next
»
Figure 2: Which user belongs where? Authentication via EAP mostly relies on RADIUS.