
Designing Access Controls
Lay Out the Network
| 
 | The NAC policies you enforce in the wired private zone might be more | 
| 
 | stringent than those in public zones. Users in the private zone typically have | 
| 
 | greater access to network resources, so you have more to protect in this zone. | 
| 
 | The NAC policies also provide opportunities to enforce company policies that | 
| 
 | might otherwise be ignored. | 
| 
 | For the endpoint integrity testing method, either the NAC EI agent or the | 
| 
 | agentless method is suitable. You might choose the agentless method if all | 
| 
 | endpoints are members of a Windows domain. | 
| 
 | VLAN Assignment and Other Dynamic Settings. A successfully authen- | 
| 
 | ticated user is assigned to the user VLAN specified for that user in RADIUS | 
| 
 | server policies. As you now know, IDM makes it easy to create policies for | 
| 
 | VLAN assignments and other rights, and these rights can be based on criteria | 
| 
 | beyond identity. | 
| 
 | An unauthenticated user is either denied all access or placed on the unauthen- | 
| 
 | ticated VLAN. | 
| 
 | 
 | 
| N o t e | In an 802.1X environment, unauthenticated users receive access to the unau- | 
| 
 | thenticated VLAN as soon as they plug into a port. In contrast, unauthenticated | 
| 
 | users in a  | 
| 
 | ticated VLAN only after failing the authentication process. | 
| 
 | Choose Switches. As in the public wired zone, the private wired zone | 
| 
 | |
| 
 | features direct wired connections between users and switches, which are the | 
| 
 | PEPs. For this zone, you should choose a switch that supports 802.1X access | 
| 
 | and allows dynamic reconfiguration of ports. (See Table  | 
| 
 | If you expect your network to grow, a chassis switch such as the 5300xl or | 
| 
 | 5400zl is often a good choice. Both of these switches support 802.1X authen- | 
| 
 | tication and access dynamic settings. | 
