Access Control Concepts

Network Access Control Technologies

7.The PEP reconfigures itself dynamically to forward or block all traffic from the MAC address associated with the request, depending on the access decision.

If the accept response included authorization instructions, the PEP con- figures itself to enforce them—for example, assigning the user’s port to the specified VLAN.

Some Web-Auth implementations allow rejected (or not-yet-authenti- cated) users to access an “Allow list” of Web sites.

Figure 1-3. The Web-Auth Process

1-20