
Designing Access Controls
Choose the Access Control Methods
If you have a large number of users who are technically unsophisticated, you may need to factor in some training if you select 802.1X as the access control method. On the other hand, if you have a large number of highly knowledge- able users (such as university students), you will probably want to rule out
| Table | |||
| Table | Access Control Method by User Sophistication Level | ||
|
|
|
| |
|
|
| 802.1X | |
|
|
|
| |
User sophistication | Low | Medium | ||
needed |
|
|
|
|
User interaction | None | Enter user credentials | • | Enter user credentials |
|
|
| • Configure a supplicant in | |
|
|
|
| some cases |
|
|
| • | Download and install |
|
|
|
| supplicant in some cases |
|
|
|
|
|
Incidentally, technical knowledge may be even more important as you con- sider endpoint integrity checking. (See “Choose the Endpoint Integrity Deployment Method” on page
Example
The PCU network administrators have selected the access control methods shown in Table
Most of the private zones are used mainly by students, whose computer skills are fairly good to excellent. They should have no problems configuring an 802.1X supplicant.
There is one exception,