
Designing Access Controls
Choose the Endpoint Integrity Deployment Method
An exception might be when you enforce
■Traffic from the wireless network is forwarded into the rest of the network at one or two choke points:
•You are using a Wireless Edge Services Module, which can act as a choke point.
•The APs connect to a single switch or a couple of switches, which can act as choke points.
■Only one virtual LAN (VLAN) exists on the wireless network (all WLANs), associated APs, and switches.
MAC-Auth
If you have selected
Often you select
Table