Resolved! Guidance in securing IP Phones and cameras with Extreme Control EAP-TLS
I am deploying Extreme Control and have the user authenticating fine. I am looking to secure other devices such as phones and cameras. From what I have seen, an Active Directory object is created for each of these devices in order for authentication ...