Security Solutions
4-3
Other Resources
Implementation
Table 4-1. Elements of Each Access Control Solution
Elements Solution 1 Solution 2 Solution 3 Solution 4 Solution 5
Access control method 802.1X 802.1X 802.1X 802.1X
Web-Auth
MAC-Auth
none
Deployment method 802.1X 802.1X inline for remote
users
(added to 802.1X
for local users)
802.1X DHCP
Endpoint integrity X X X none X
Authentication protocol EAP-TLS EAP-TLS
EAP-MD5
PEAP
IPsec with
IKE—digital
certificates
(added to EAP-
TLS locally)
EAP-TLS none
Wireless encryption WPA/WPA2 WPA/WPA2 WPA/WPA2 WPA/WPA2
WPA-PSK
WPA-PSK
Testing method NAC EI agent
Agentless
NAC EI agent NAC EI agent
ActiveX
none NAC EI agent
ActiveX
IDM X none X X none
RADIUS NAC 800 IAS NAC 800 NAC 800 none
Directory Active Directory Active Directory Active Directory OpenLDAP eDirectory
VLANs XXXXX
VPN none none X none none
Wireless Edge Services
Module
XXXXnone
APs/RPs RPs RPs RPs RPs AP 530
DHCP configuration X X X X X
Certificate services X X X none none
PCM+ XnoneXXnone
SNMP XnoneXXnone
DNS configuration X X X X X
Other • DHCP
snooping
•ARP
protection