
Designing Access Controls
Choose the Access Control Methods
Even gaming devices, such as Microsoft XBox 360, include a NIC, allowing them to connect to a network and support
At PCU, for example, the network administrators plan to create a secure Web page that guides students through the process of registering their gaming devices. Network administrators also plan to use IDM to limit the times when such devices can access the network. Students will be able to play games over the network from 7 p.m. to 1 a.m.
Because the Web browser has become a standard user application, most workstations, laptops, and smartphones support
However, legacy OSs, such as Windows NT or Windows ME, do not support 802.1X without special installation of a
Example
Table
Table 3-10. Configuration of PCU’s Endpoints
Hardware | Type of Interface | Operating System | Access Control Method | |
Workstations | User interface, flexible | May or may not be compatible; | ||
|
|
| supplicant installation easy |
|
Laptops | User interface, flexible | May or may not be compatible; | ||
|
|
| supplicant installation easy |
|
PDAs and smart phones | User interface, somewhat | May or may not be compatible; | ||
| flexible | supplicant installation may be |
| |
|
|
| difficult |
|
IP telephone exchange | Headless; inflexible | n/a | ||
Printers, fax machines, | • | Older “headless” printers— | n/a | |
and so on |
| inflexible |
|
|
| • | Newer |
|
|
|
|
|
|
|