Problem Statement
A client asks you to validate NAC controls ethically. How do you scope and execute this?
Explanation
Define allowed test methods and devices. Start with posture checks using a clean, patched machine. Confirm 802.1X behavior: unauth, guest, quarantine, and production VLAN outcomes. Attempt only the agreed, low-risk checks like plugging an unmanaged device to see if it lands in guest. Do not spoof identities or disrupt neighbors without explicit permission. Document each state change and the policy result so owners can tune rules safely.
Code Solution
SolutionRead Only
States: unauth → guest; compliant → prod; non-compliant → quarantine; record switchport and VLAN
