Security Solutions
3-13
Designing Access Controls
Choose the Access Control Methods
Choose the Access Control Methods
As outlined in Chapter 1: “Access Control Concepts,” there are three access
control methods:
■ MAC Authentication (MAC-Auth)
■ Web Authentication (Web-Auth)
■ 802.1X
Each method has advantages and disadvantages, as Table 3-1 shows.
Table 3-1. Advantages and Disadvantages of Access Control Methods
Access Control
Method
Advantages Disadvantages Security Level
MAC-Auth (local and
RADIUS)
• Control over which
endpoints connect to the
network
• No software on the endpoint
• In the wireless world, easy
to combine with other
security
• Not scalable
• High administrative
overhead
• Susceptible to
spoofing—fairly easy to
spoof authorized MAC
address
• Hardware-based, rather
than user-based,
authentication
Low
• Low-to-medium effort to
crack
• Prevents casual,
unauthorized users
Web-Auth • Ideal for public zones
• Control over which users
access the network
• No configuration
required—especially for
wireless endpoints
• No 802.1X supplicant
required
• Centralized user
authentication
• No encryption by default
• RADIUS server required
• Web browser interface
(user interaction)
required—no
authentication of headless
devices
• No seamless roaming for
wireless networks
Medium
• Medium-to-high effort to
crack
• Prevents more diligent
attacks than MAC-Auth
does