Security Solutions
1-18
Access Control Concepts
Network Access Control Technologies
Figure 1-2. The MAC-Auth Process
Local MAC-Auth. ProCurve Networking’s Adaptive Edge Architecture
(AEA) emphasizes control from the center—centralized policies enforced by
edge devices. Centralizing policies saves IT staff time and ensures users a
consistent network experience. However, an organization with a very small
network might impose network access controls set up entirely on the edge
device.
With local MAC-Auth, the PEP also acts as the PDP. It stores a local list of valid
MAC addresses (a white list) or prohibited addresses (a black list) and
controls access to its ports accordingly.