
Designing Access Controls
Integrating all Parts of the Network Design
Migrating from One Solution to Another
Although 802.1X authentication provides the strongest access control secu- rity, you may not start with that access control method. (See “Choose the Access Control Methods” on page
To plan for the migration, choose a switch that accommodates 802.1X as well as