
Designing Access Controls
Choose the Access Control Methods
|
| Table | Access Control Method by User Type and Sophistication | ||
|
|
|
|
| |
Factor | Private Wired | Public Wired | Private Wireless | Public Wireless | |
|
|
|
|
|
|
User type and | • | 802.1X | 802.1X with WPA/ | ||
sophistication | • | WPA2 |
| ||
|
| administration |
|
| |
|
| building only |
|
|
|
|
|
|
|
|
|
Administrative Workload
Do network administrators have the time and resources to implement the access control method?
Unless your IT department is in the unusual situation of having too many people and not enough work, the access control method you select should not require excessive administrator involvement. For example, if you were to use
Sometimes, however, you must weigh the administrative burden against your company’s need for security. For example, universities must accommodate a new group of students each semester. If you use 802.1X security, you must update the user accounts each semester. This may create administrative overhead, although network administrators undoubtedly automate the pro- cess as much as possible. (“Choose RADIUS Servers” on page
Although you may be willing to incur some administrative overhead in imple- menting access control, you should also look for ways to limit the resources needed. For example, if you are using
Example
Table