Designing Access Controls
Choose the Access Control Methods
In addition to the endpoints listed in Table
You should always secure physical access to your servers so that unauthorized users cannot access them and steal your data or change your configuration. However, if you have a small company and cannot place the servers in a secure, locked room, you should implement 802.1X for the server ports and password protect each server’s console.
Basing the decision solely on endpoint compatibility factors, the PCU network administrators decide that for workstations,
In addition, PCU has a few APs that do not have an 802.1X supplicant. The network administrators decide to use
Table
Table 3-11. Access Control Method by Endpoint Capabilities
Factor | Private Wired | Public Wired | Private Wireless | Public Wireless |
|
|
|
|
|
Endpoint capabilities • 802.1X for all endpoints that support it
•
• | 802.1X with WPA/ | |
endpoints that | WPA2 |
|
support it |
|
|
•
Administrative Control over Endpoints
You must next consider who controls the
For example, if the IT staff controls the endpoints, it is relatively easy to ensure that each one has a supplicant for an 802.1X implementation. If
Table