Constructing user and device authorization in the network solely on VLAN assignments does not correspond to state-of-the-art security deployment. In a zero-trust network, users and devices should be given the appropriate permissions on the network. These should be granted according to security best practices such as role-based access control or "need-to-know" principles. And this regardless of which VLAN or where the user/device is located: in the company, home office or hotel room.
We show you how you can use Central to build your Aruba access points and switches into a zero-trust network step by step.