Trust boundary
I just can't get this term through my head.
Is a trust boundary the device being trusted or the device doing the trusting? GRrrrr... I think I have it then a day later I forget.
Is a trust boundary the device being trusted or the device doing the trusting? GRrrrr... I think I have it then a day later I forget.
-Daniel
Comments
-
abhustler Member Posts: 49 ■■□□□□□□□□I just can't get this term through my head.
Is a trust boundary the device being trusted or the device doing the trusting? GRrrrr... I think I have it then a day later I forget.
I think the easiest way to understand the concept is to think of the trust boundary as the last trusted device in the path. If you take a simple topology of switch - phone - pc the trust boundary will be deteremined by how the switch port is configured. If the switch port is not configured to trust the trust boundary is the switch, if the switch is configured as trust the boundary is the phone, and finally if the switch is configured as extended trust the the boundary is the pc.A master at anything was once a beginner