
Access Control Concepts
Network Access Control Technologies
Authentication Requirements
Access control methods may impose some requirements on the endpoints:
■MAC-Auth—None
■
■
The following Windows OS versions include a native 802.1X supplicant:
•Windows Vista
•Windows XP
•Windows 2000 SP4
Mac OS 10.3 also provides native support for 802.1X. The OpenX project has developed the Xsupplicant for Linux systems.
An 802.1X supplicant can also be installed on an endpoint as software from a
Typically, 802.1X requires some form of user interaction; however, some smartphones and printers are 802.1X capable. These devices include supplicants that automatically submit credentials such as a SIM or digital certificate.
Authentication Protocols
Users and authentication servers communicate through authentication proto- cols, which dictate the process of submitting credentials. You’ve already learned a little about authentication protocols as they play a role in the three access control authentication methods.
You should understand these protocols in more detail:
■Password Authentication Protocol (PAP)
■Challenge Handshake Authentication Protocol (CHAP)
■Microsoft CHAP
■EAP
■RADIUS