Designing Access Controls
Lay Out the Network
Remember, in either case, you can allow unauthenticated users to be placed on an unauthenticated VLAN.
Endpoint Integrity. Particularly when you allow members of the public to connect their own equipment to your network, you should implement end- point integrity. The most suitable deployment method is usually DHCP, and the most suitable testing method is ActiveX (because ActiveX testing does not require any installation of software or entering of credentials).
Even if guests use your company’s equipment, you might want to test the equipment’s integrity; otherwise, you cannot be certain guests will not alter security settings and perhaps introduce malware. Because your organization owns the equipment, you can choose the NAC EI agent testing method if you so desire.
Table 3-106. Public Wired Zone Policies
Zone | Authentication | EI Deployment | Testing Method | Authentication | Encryption |
| Method |
|
| Protocol |
|
|
|
|
|
|
|
Public wired | DHCP | NAC EI agent or | none | ||
Private equipment |
| ActiveX |
| ||
Public wired | DHCP | ActiveX | none | ||
Guest equipment |
|
|
|
| |
|
|
|
|
|
|
Choose Switches. The public wired zone features direct connections between users and switches, which serve as the PEPs. You will need switches that support
Table
Table
Switch Series | 802.1X | Dynamic VLAN | Dynamic ACLs | ||
|
|
|
| Assignment |
|
|
|
|
|
|
|
5400zl | X | X | X | X | X |
5300xl | X | X | X | X | X |
4200vl | X | X | X | X |
|
4100gl |
|
| X | X |
|
3500yl | X | X | X | X | X |