Like DarkYendor said, it's typically network design and not the end devices that matter most. What method of authentication would one use on a Security Camera / IoT device or similar? If you had concerns that a bad actor could walk up and plug in something harmful, I'd suggest locking down your network using a layered approach.Ideally on network design the end device must authenticate itself before being allowed to communicate, otherwise just any old device could be plugged in to do what it likes.
802.1x authentication using a Radius server is very common, and well supported.What method of authentication would one use on a Security Camera / IoT device or similar?
Exactly, hence the need for strong authentication of the end device.If you had concerns that a bad actor could walk up and plug in something harmful, I'd suggest locking down your network using a layered approach.
Agreed, sure... but 802.1X is a bit complex for this type of device and end user. I'm all for making our camera networks more secure, but that comes from a solid network behind them.802.1x authentication using a Radius server is very common, and well supported.
If you have a device capable of 802.1x authentication, that should also be the device doing the VLAN tagging. No reason to extend a VLAN trunk out to the end device.802.1x authentication using a Radius server is very common, and well supported.