
Access Control Concepts
Network Access Control Technologies
| 
 | The network access controller enters the 802.1X framework as either an | 
| 
 | authentication server or a supplement to the authentication server. It inserts | 
| 
 | checking an endpoint’s integrity into the process of making access decisions. | 
| 
 | For example, the network access controller detects and tests all endpoints | 
| 
 | when they first connect to the network. It then report the endpoints’ integrity | 
| 
 | posture to network RADIUS servers, which are configured with policies that | 
| 
 | take these postures into account. If necessary, the RADIUS server alters a | 
| 
 | user’s assignment and places him or her in a quarantine VLAN. | 
| 
 | The ProCurve NAC 800 includes its own  | 
| 
 | provide both components of the solution. | 
| 
 | DHCP. The DHCP quarantine method is designed primarily for networks with | 
| 
 | equipment that is not 802.1X capable. Any endpoint is allowed to connect to | 
| 
 | the network. However, the network access controller prevents  | 
| 
 | endpoints from receiving a valid IP address. Instead, these endpoints receive | 
| 
 | an address in the quarantine subnet, which has access only to remediation | 
| 
 | services. | 
| 
 | With the DHCP deployment method, part of a network access controller’s role | 
| 
 | is acting as another PEP, quarantining  | 
| 
 | must position the network access controller  | 
| 
 | server and the rest of the network. | 
| 
 | 
 | 
| N o t e | An  | 
| 
 | address can circumvent DHCP quarantining. This is one reason that 802.1X is | 
| 
 | the recommended option for high security. | 
| 
 | Inline. With inline quarantining, perhaps the most straightforward of the | 
| 
 | |
| 
 | three options, a network access controller physically separates endpoints | 
| 
 | from network resources. | 
| 
 | This option has the advantage of ease of setup as well as relatively high | 
| 
 | security. Because the network access controller literally stands between the | 
| 
 | endpoint and network resources, it can tightly control which endpoint traffic | 
| 
 | passes through it. | 
| 
 | However, deploying a network access controller between every Ethernet | 
| 
 | workstation and its switch port is not a realistic option. And the further the | 
| 
 | network access controller is from the endpoint, the more resources the | 
| 
 | endpoint can access before it is tested. Inline quarantining is most viable when | 
| 
 | many endpoints connect to your network through a single point of access. | 
