Has anyone encountered a similar security concern and have any effective method of dealing with it...
Currently we are looking to do 802.1x authentication on the wired port of our RAP devices. Corp PCs would have the correct LAN profile and dot3svc service running. Concern has been raised that a NAT box could be connected to the RAP, with permitted and non-permitted clients behind that. The one permitted client would authenticate, thus putting the NAT box in an employee user-role and allowing access from all non-permitted devices connected to it.
I was thinking of layering a MAC filter on top of 802.1x but that doesn't stop MAC spoofing. Is there anything either built in or external which can anyone has done to address this threat?
Not sure if a 802.1x frame can even be passed successfully through a NAT boundary. If you are not allowing devices that do not pass 802.1x, then putting a nat box behind the RAP will not allow any unauthenticated users.
At Aruba, we believe that the most dynamic customer experiences happen at the Edge. Our mission is to deliver innovative solutions that harness data at the Edge to drive powerful business outcomes.
© Copyright 2020 Hewlett Packard Enterprise Development LPAll Rights Reserved.