Designing Access Controls
Choose the Access Control Methods
Choose the Access Control Methods
As outlined in Chapter 1: “Access Control Concepts,” there are three access control methods:
■MAC Authentication
■Web Authentication
■802.1X
Each method has advantages and disadvantages, as Table
| Table | Advantages and Disadvantages of Access Control Methods | |
|
|
|
|
Access Control | Advantages | Disadvantages | Security Level |
Method |
|
|
|
|
|
|
|
• Control over which | • | Not scalable | |
RADIUS) | endpoints connect to the | • | High administrative |
| network |
| overhead |
| • No software on the endpoint | • | Susceptible to |
| • In the wireless world, easy |
| |
| to combine with other |
| spoof authorized MAC |
| security |
| address |
Low
•
•Prevents casual, unauthorized users
• | Ideal for public zones | |
| • Control over which users | |
|
| access the network |
| • | No configuration |
|
| |
|
| wireless endpoints |
| • | No 802.1X supplicant |
|
| required |
| • | Centralized user |
|
| authentication |
•
•No encryption by default
•RADIUS server required
•Web browser interface (user interaction)
•No seamless roaming for wireless networks
Medium
•
•Prevents more diligent attacks than