Security Solutions
3-149
Designing Access Controls
Integrating all Parts of the Network Design
Migrating from One Solution to Another
Although 802.1X authentication provides the strongest access control secu-
rity, you may not start with that access control method. (See “Choose the
Access Control Methods” on page 3-13.) If you start with MAC-Auth or Web-
Auth, you may migrate toward 802.1X in the future, as both computers and
users become more sophisticated about access control.
To plan for the migration, choose a switch that accommodates 802.1X as well
as MAC-Auth and Web-Auth (as do all of the ProCurve switches). Also choose
a RADIUS server that supports EAP so that you can easily upgrade to 802.1X,
keeping the same server and much the same policies.