About in WLAN User isolation technology is used in the networking environment. Which of the following statements is wrong?
In a centralized networking, the database, SM server, SC server, and AE server are all centrally installed in the corporate headquarters. This networking method is suitable. It is used for enterprises with a wide geographical distribution of users and a large number of users.
Identity authentication determines whether to allow access by identifying the identity of the access device or user.
In the Agile Controller-Campus solution, which device is usually used as the hardware SACG?