
Designing Access Controls
Choose the Access Control Methods
Table 3-14. Authentication Method by Administrative Control
Factor | Private Wired | Public Wired | Private Wireless | Public Wireless |
Administrative control | 802.1X | 802.1X with WPA/ | ||
|
|
| WPA2 |
|
|
|
|
|
|
Network Infrastructure Devices
Finally, look at your existing network infrastructure:
■What access methods do your network infrastructure devices support?
■Which network infrastructure devices have 802.1X supplicants?
The network infrastructure devices can dictate the access control method; if the switches do not support an access control method, you can either replace them or choose a method that your switches do support. Table
Table
Switch Series |
|
| 802.1X |
5400zl | X | X | X |
5300xl | X | X | X |
4200vl | X | X | X |
4100gl |
|
| X |
3500yl | X | X | X |
3400cl | X | X | X |
2900 | X | X | X |
2810 | X | X | X |
2800 | X | X | X |
2600 | X | X | X |
2510 |
|
| X |
2500 | local only |
| X |
1800 |
|
|
|
1700 |
|
|
|
|
|
|
|