Juniper JN0-650 Question Answer
You are asked to establish authentication for users connecting to the corporate network. You must ensure that only corporate devices that are identified by MAC addresses are allowed to authenticate and connect Authentication must be handled by a centralized database.
Which authentication method would you implement in this scenario?

