Access Control Concepts

Network Access Control Technologies

Figure 1-2. The MAC-Auth Process

Local MAC-Auth.ProCurve Networking’s Adaptive Edge Architecture (AEA) emphasizes control from the center—centralized policies enforced by edge devices. Centralizing policies saves IT staff time and ensures users a consistent network experience. However, an organization with a very small network might impose network access controls set up entirely on the edge device.

With local MAC-Auth, the PEP also acts as the PDP. It stores a local list of valid MAC addresses (a white list) or prohibited addresses (a black list) and controls access to its ports accordingly.

1-18