Designing Access Controls
Choose the Access Control Methods
Table 3-21. Preliminary Decisions for the Access Control Method
Factor | Weight | Private Wired | Public Wired | Private Wireless | Public Wireless | |||
Security | 3 |
| • | 802.1X | 802.1X | 802.1X with WPA/ | 802.1X with WPA/ | |
|
|
| • |
|
| WPA2 | WPA2 | |
|
|
|
| the |
|
|
|
|
|
|
|
| administration |
|
|
|
|
|
|
|
| building only |
|
|
|
|
|
|
|
|
|
|
| ||
User type and | • | 2 for private | 802.1X | 802.1X with WPA/ | ||||
sophistication |
| zones |
|
|
|
| WPA2 |
|
| • | 3 for public |
|
|
|
|
|
|
|
| zones |
|
|
|
|
|
|
|
|
|
|
|
|
| ||
Administrative | 2 |
| ||||||
workload |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Endpoint | 3 |
| • | 802.1X for all | • | 802.1X with WPA/ | ||
capabilities |
|
|
| endpoints that |
| all endpoints | WPA2 |
|
|
|
|
| support it |
| that support it |
|
|
|
|
| • | • |
|
| ||
|
|
|
| headless |
| headless |
|
|
|
|
|
| devices and |
| devices |
|
|
|
|
|
| legacy APs |
|
|
|
|
|
|
|
|
|
|
| ||
Administrative | 1 |
| 802.1X | 802.1X | 802.1X with WPA/ | |||
control |
|
|
|
|
|
| WPA2 |
|
|
|
|
|
|
|
| ||
Existing | 3 |
| 802.1X | 802.1X | 802.1X with WPA/ | 802.1X with WPA/ | ||
infrastructure |
|
|
|
|
|
| WPA2 | WPA2 |
|
|
|
|
|
|
|
|
|
Total |
|
| • | 802.1X for all | • | 802.1X with WPA/ | ||
|
|
|
| endpoints that |
| all endpoints | WPA2 |
|
|
|
|
| support it |
| that support it |
|
|
|
|
| • | • |
|
| ||
|
|
|
| headless |
| headless |
|
|
|
|
|
| devices and |
| devices |
|
|
|
|
|
| legacy AP |
|
|
|
|
|
|
|
|
|
|
|
|
|
One concern for PCU could be that some headless devices and legacy APs require
Table