|
The access layer is the
point at which local end users are allowed into the network. Controlling
access at the access layer can be done by using port security and
passwords to protect network devices. This layer may also use access
lists or filters to further optimize the needs of a particular set of
users.
|