Hi Ekr,
Thanks for the opportunity!
As someone who has implemented and deployed EAP methods as well as
someone who is genuinely interested in this area, I look forward to
working with all of you.
However, I am till taking baby steps in this new role and I appreciate
your honest feedback
One of the confusions from the meeting was "How can a device authenticate via
802.1X if it doesn't trust the network?"
I think the confusion is due to terminology. The discussion in the meeting,
and in the draft was about the device "authenticating" to the network during
initial