This document discusses best practices for securing the wired access network. It begins by explaining why securing the LAN is important due to increased mobility and use of personal devices. It then reviews common methodologies for securing the LAN such as port security, MAC whitelisting, and 802.1X authentication. The document demonstrates how using device profiling and context from sources like EMM/MDM can improve enforcement options. It also addresses challenges like handling "headless" devices and preventing MAC spoofing.