What is the true difference in LAYER 2 Enforcement and Overlay Enforcement ? Are they steps in the process, or 2 different methods ? what is example of each of them ?
??? waiting to undestand this concept from experts thru this discussion thread !
Solved! Go to Solution.
An overlay or L3 enforcer is a Juniper firewall (either ScreenOS or Junos based). It enforces network access at layer 3 of the OSI model.
Layer 2 enforcment is done at the switch or wireless access point level and uses the 802.1X authentiction protocol suite to authenticate a user BEFORE they get any network access.
Hope that clears things up a bit.
Thanks
Craig
An overlay or L3 enforcer is a Juniper firewall (either ScreenOS or Junos based). It enforces network access at layer 3 of the OSI model.
Layer 2 enforcment is done at the switch or wireless access point level and uses the 802.1X authentiction protocol suite to authenticate a user BEFORE they get any network access.
Hope that clears things up a bit.
Thanks
Craig