
Designing Access Controls
Choose the Endpoint Integrity Deployment Method
Table 
| Factor | Weight | Private Wired | Public Wired | Private | Public | Remote | 
| 
 | 
 | 
 | 
 | Wireless | Wireless | 
 | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| Selected access | 1 | 802.1X | DHCP | 802.1X | DHCP | n/a | 
| control method | 
 | 
 | 
 | 
 | 
 | 
 | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| Security | 2 | 802.1X | Inline | 802.1X | Inline | Inline | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| Existing network | 4 | 802.1X | DHCP | 802.1X | DHCP | Inline | 
| infrastructure | 
 | 
 | 
 | 
 | 
 | 
 | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| Connection type | 3 | n/a | n/a | n/a | n/a | Inline | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
| Total | 
 | 802.1X | DHCP | 802.1X | DHCP | Inline | 
| 
 | 
 | 
 | 
 | 
 | 
 | 
 | 
For PCU, the network administrators’ earlier reality checks have served them well: all zones support the selected methods.
In summary, the PCU zones will deploy their NAC 800s with the endpoint integrity deployment methods shown below.
Table 3-42.  Deployment Method by Zone
| Zone | Deployment Method | 
| Private wired | 802.1X | 
| Public wired | DHCP | 
| Private wireless | 802.1X | 
| Public wireless | DHCP | 
| Remote | Inline | 
| 
 | 
 | 
