Le 16/02/2021 à 14:02, Cliff Sojourner via 44Net a écrit :
User authentication and user authorization belong in
application layer, there is no place for those in any network layer.
I don't know on which layer you could put it, but filtering access by
source IP is a commonly used technique in business networks for
restricting access.
Of course, it's different from user authentication. But it can be useful
as a simple pre-authentication for a group of users : all users coming
from a 44net IP are licensed operators. Then, a simple firewall rule can
grant them access to the private parts of the network.
73 de TK1BI