Key features
User authentication via passwords
Device authentication for L2, L3 connections via MAC, IP addresses
Device and user authentication using PKI X509
User, device, and application-based access control
