Question: You are a network security engineer responsible for securing your organizations network infrastructure and services. You receive a request from your metropolitan police department that
You are a network security engineer responsible for securing your organizations network infrastructure and services. You receive a request from your metropolitan police department that states that someone from a public IP address of 200.200.200.253 may have committed some unauthorized hacks of a competing organization. You notice that IP address is the PAT (port address translation) address that you use for your Guest Wireless users when accessing the Internet. The Metro police department is asking if you are able to identify when this event may have occurred and possibly the user or users. What steps would you take to identify the user's attempt and machine? Since this is your Guest Wireless domain how would you identify the particular user? What methods should already be in place to address a scenario such as this?
Windows has to forms of authentication User and Machine. 802.1x focuses on the User Identification thus when no user logged in a computer no network access is granted. How did Microsoft resolve this issue? Moreover what EAP methods address this issue of User Authentication and Machine Authentication?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
