Security Solutions

1-20
Access Control Concepts
Network Access Control Technologies
7. The PEP reconfigures itself dynamically to forward or block all traffic
from the MAC address associated with the request, depending on the
access decision.
If the accept response included authorization instructions, the PEP con-
figures itself to enforce them—for example, assigning the user’s port to
the specified VLAN.
Some Web-Auth implementations allow rejected (or not-yet-authenti-
cated) users to access an “Allow list” of Web sites.
Figure 1-3. The Web-Auth Process