Are there any areas of the network that don't currently require authentication to access?
Networks have two types of boundaries: physical and operational. Physically, we consider a boundary to be a port on a wall or a perimeter router. Operational boundaries are the best place to look if we want to find out whether or not authentication should be required. For example, a large number of organizations allow free, or open, network access to visitors or customers. These areas of the network are often operationally separate from the parts of the network where the work is done. In cases like this, the open network doesn't require any form of authentication. As an example, consider the free wireless access at coffee shops, airports and cafes.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.