Designing Access Controls

Choose the Endpoint Integrity Deployment Method

An exception might be when you enforce Web-Auth on wireless LANs (WLANs). You can use the inline deployment method if the wireless network meets these requirements:

Traffic from the wireless network is forwarded into the rest of the network at one or two choke points:

You are using a Wireless Edge Services Module, which can act as a choke point.

The APs connect to a single switch or a couple of switches, which can act as choke points.

Only one virtual LAN (VLAN) exists on the wireless network (all WLANs), associated APs, and switches.

MAC-Auth

If you have selected MAC-Auth as the only access control method in a zone, it is probably because the network infrastructure devices do not support 802.1X. Check other capabilities on the network infrastructure devices. As long as they are capable of receiving dynamic VLAN assignments from the RADIUS server, the NAC 800 can use the 802.1X deployment method for the zone. If the switches and APs cannot receive dynamic VLAN assignments, you must choose a different method—almost always DHCP.

Often you select MAC-Auth as the access control method for headless devices or even gaming devices in a zone that otherwise enforces 802.1X. In this case, you can use the 802.1X endpoint integrity deployment method for the entire zone.

Table 3-34 summarizes the best method of deployment depending on the access control method.

3-52

Page 168
Image 168
HP Access Control Client Software manual MAC-Auth