Designing Access Controls

Choose the Access Control Methods

Table 3-14. Authentication Method by Administrative Control

Factor

Private Wired

Public Wired

Private Wireless

Public Wireless

Administrative control

802.1X

Web-Auth

802.1X with WPA/

Web-Auth

 

 

 

WPA2

 

 

 

 

 

 

Network Infrastructure Devices

Finally, look at your existing network infrastructure:

What access methods do your network infrastructure devices support?

Which network infrastructure devices have 802.1X supplicants?

The network infrastructure devices can dictate the access control method; if the switches do not support an access control method, you can either replace them or choose a method that your switches do support. Table 3-15lists the access control methods that ProCurve switches support.

Table 3-15. Network Access Control Capabilities of ProCurve Edge Switches

Switch Series

MAC-Auth

Web-Auth

802.1X

5400zl

X

X

X

5300xl

X

X

X

4200vl

X

X

X

4100gl

 

 

X

3500yl

X

X

X

3400cl

X

X

X

2900

X

X

X

2810

X

X

X

2800

X

X

X

2600

X

X

X

2510

 

 

X

2500

local only

 

X

1800

 

 

 

1700

 

 

 

 

 

 

 

3-29