Network Access Control (NAC) is a critical security framework for managing endpoint access to a network. The HCSP-Presales-Campus Network Planning and Design V1.0 documentation outlines various NAC methods and their characteristics:
A. MAC Address Authentication: This method relies on the unique MAC address of a device for authentication. In most cases, it requires administrators to manually register MAC addresses in adatabase (e.g., on a RADIUS server), which increases management complexity, especially in large or dynamic networks. This statement is true.
B. 802.1X Authentication Requirements: Contrary to the statement, 802.1X authentication typically has high requirements for client software, as it requires a supplicant (e.g., a compatible client supporting EAP) to be installed and configured on user terminals. This limits its flexibility in environments with diverse or unmanaged devices, making the statement false.
C. 802.1X Authentication Applicability: 802.1X is ideal for newly deployed networks with centralized user bases (e.g., enterprise campuses) and stringent security needs, as it enforces strong authentication (e.g., via EAP-TLS). This aligns with its use in controlled, high-security environments, making the statement true.
[Reference: HCSP-Presales-Campus Network Planning and Design V1.0, Section on NAC Methods and Deployment Scenarios., , ]