
Designing Access Controls
Choose the Access Control Methods
Table 3-14.  Authentication Method by Administrative Control
| Factor | Private Wired | Public Wired | Private Wireless | Public Wireless | 
| Administrative control | 802.1X | 802.1X with WPA/ | ||
| 
 | 
 | 
 | WPA2 | 
 | 
| 
 | 
 | 
 | 
 | 
 | 
Network Infrastructure Devices
Finally, look at your existing network infrastructure:
■What access methods do your network infrastructure devices support?
■Which network infrastructure devices have 802.1X supplicants?
The network infrastructure devices can dictate the access control method; if the switches do not support an access control method, you can either replace them or choose a method that your switches do support. Table 
Table 
| Switch Series | 
 | 
 | 802.1X | 
| 5400zl | X | X | X | 
| 5300xl | X | X | X | 
| 4200vl | X | X | X | 
| 4100gl | 
 | 
 | X | 
| 3500yl | X | X | X | 
| 3400cl | X | X | X | 
| 2900 | X | X | X | 
| 2810 | X | X | X | 
| 2800 | X | X | X | 
| 2600 | X | X | X | 
| 2510 | 
 | 
 | X | 
| 2500 | local only | 
 | X | 
| 1800 | 
 | 
 | 
 | 
| 1700 | 
 | 
 | 
 | 
| 
 | 
 | 
 | 
 | 
