Designing Access Controls
Choose the Endpoint Integrity Deployment Method
Table
Factor | Weight | Private Wired | Public Wired | Private | Public | Remote |
|
|
|
| Wireless | Wireless |
|
|
|
|
|
|
|
|
Selected access | 1 | 802.1X | DHCP | 802.1X | DHCP | n/a |
control method |
|
|
|
|
|
|
|
|
|
|
|
|
|
Security | 2 | 802.1X | Inline | 802.1X | Inline | Inline |
|
|
|
|
|
|
|
Existing network | 4 | 802.1X | DHCP | 802.1X | DHCP | Inline |
infrastructure |
|
|
|
|
|
|
|
|
|
|
|
|
|
Connection type | 3 | n/a | n/a | n/a | n/a | Inline |
|
|
|
|
|
|
|
Total |
| 802.1X | DHCP | 802.1X | DHCP | Inline |
|
|
|
|
|
|
|
For PCU, the network administrators’ earlier reality checks have served them well: all zones support the selected methods.
In summary, the PCU zones will deploy their NAC 800s with the endpoint integrity deployment methods shown below.
Table 3-42. Deployment Method by Zone
Zone | Deployment Method |
Private wired | 802.1X |
Public wired | DHCP |
Private wireless | 802.1X |
Public wireless | DHCP |
Remote | Inline |
|
|