Chapter 4: Architecture Design

Typical system topology, device connection diagrams, and reference architecture for enterprise identity authentication deployments

Architecture design for a network identity authentication system requires careful consideration of redundancy, scalability, survivability, and security zone separation. This chapter presents reference architectures for single-site, multi-site, and cloud-hybrid deployments, along with detailed device connection diagrams that illustrate the physical and logical relationships between authentication infrastructure components. Each architecture is accompanied by design rationale, sizing guidance, and key configuration parameters.

4.1 Reference Architecture: Single-Site Enterprise

The single-site reference architecture is designed for organizations with 200–2,000 endpoints concentrated at a single campus or building complex. The architecture places all authentication infrastructure in a dedicated security services VLAN within the data center, with redundant RADIUS servers in active-active configuration. Access switches and wireless controllers are configured as 802.1X authenticators, forwarding EAP traffic to the RADIUS cluster over a dedicated management VLAN. The PKI/CA server issues certificates to managed endpoints via SCEP/EST, while the NAC policy engine provides device profiling and posture assessment.

Enterprise Identity Authentication System Topology
Figure 4.1: Enterprise Identity Authentication System Topology — Three-tier architecture with Data Center Core (AD/LDAP, RADIUS Cluster, TACACS+, PKI/CA, NAC, SIEM, NTP), WAN/MPLS/SD-WAN, and Branch Sites with local RADIUS servers, access switches, wireless APs, workstations, and IoT devices
ComponentQuantityPlacementHA ModelSizing Basis
RADIUS Server2 (cluster)Data Center Security VLANActive-Active1,000 auth/s per node; scale at 70% utilization
AD/LDAP Server2 (DC pair)Data Center Identity VLANActive-Active (AD replication)Standard DC sizing; 1 DC per 1,000 users
PKI/CA Server2 (offline root + online sub-CA)Offline root in vault; sub-CA in DCSub-CA clusteredCertificate volume × 2 for renewal headroom
NAC Policy Engine1–2Data Center Security VLANActive-Standby1 node per 5,000 concurrent sessions
TACACS+ Server2Data Center Management VLANActive-StandbyDevice count × 10 sessions per device
SIEM1 (cluster)Data Center Security VLANClusteredEPS × 1.3 headroom; 180-day retention

4.2 Device Connection Diagram

The device connection diagram illustrates the physical and logical wiring between all authentication infrastructure components, including protocol labels, port numbers, and IP addressing conventions. This diagram serves as the primary reference for network engineers during deployment and troubleshooting. Each connection is labeled with the protocol, transport, and port number to enable precise firewall rule creation and network segmentation design.

Device Connection and Interface Logic Diagram
Figure 4.2: Device Connection and Interface Logic Diagram — Core Switch (CORE-SW-01) as central hub connecting RADIUS-SRV-01 (UDP 1812/1813), TACACS-SRV-01 (TCP 49), AD-LDAP-SRV-01 (TCP 389/636), PKI-CA-SRV-01 (SNMP UDP 161), WLC-01 (CAPWAP), ACCESS-SW-01 (fiber uplink), and FIREWALL-01 (internet edge)
SourceDestinationProtocolPort(s)Purpose
Access Switch / WLCRADIUS ServerUDP1812, 1813Authentication and accounting
Network DevicesTACACS+ ServerTCP49Admin command authorization
RADIUS ServerAD/LDAP ServerTCP389 (LDAP), 636 (LDAPS)User/group lookup, password validation
RADIUS ServerPKI/CA ServerHTTP/HTTPS80, 443OCSP certificate revocation check
All ServersSIEMTCP/TLS6514Syslog event forwarding
All DevicesNTP ServerUDP123Time synchronization
RADIUS ServerAccess Switch / WLCUDP3799CoA (Change of Authorization)
NAC EngineAccess SwitchSNMP/SSH161, 22Device profiling and enforcement

4.3 Multi-Site Architecture

For organizations with 3–30 sites, the multi-site architecture extends the single-site model with WAN survivability and identity replication. Each branch site maintains a local RADIUS server and domain controller that can authenticate users independently during WAN outages. Policy synchronization between the central policy engine and branch RADIUS servers ensures consistent enforcement across all sites. The architecture supports both MPLS and SD-WAN connectivity, with automatic failover between primary and secondary WAN paths.

Site TypeLocal ComponentsCentral DependenciesSurvivability Duration
HQ / Primary Data CenterFull stack (RADIUS, AD, PKI, NAC, SIEM, TACACS+)None (authoritative source)N/A (authoritative)
Large Branch (> 200 users)Local RADIUS, Local DC, Local NTPCentral PKI (OCSP), Central SIEM48–72 hours (cached policy)
Medium Branch (50–200 users)Local RADIUS (proxy mode), RODCCentral AD, Central PKI, Central SIEM24–48 hours (cached credentials)
Small Branch (< 50 users)RADIUS proxy on router/switchCentral RADIUS, Central AD, Central PKIStatic fallback VLAN only

4.4 Security Zone Design

Proper security zone separation is critical for protecting authentication infrastructure from lateral movement attacks. Authentication servers must be placed in a dedicated security services zone with restrictive firewall rules permitting only the specific protocols and source addresses required for each integration. The management plane must be separated from the data plane, with all administrative access brokered through the PAM jump server. The following table defines the recommended zone structure and inter-zone firewall policy.

ZoneComponentsInbound Allowed FromOutbound Allowed To
Identity Core ZoneAD/LDAP, PKI/CA, RADIUS, TACACS+Network Infrastructure Zone (RADIUS/TACACS+), Management Zone (admin)SIEM Zone (syslog), NTP Zone
Network Infrastructure ZoneCore/Access Switches, WLC, FirewallUser Zone (802.1X), Management Zone (admin)Identity Core Zone (RADIUS/TACACS+), Internet (filtered)
Management ZonePAM Jump Server, NMS, NTPAdmin workstations (MFA required)All zones (admin protocols only)
SIEM ZoneSIEM, Log AggregatorAll zones (syslog TLS 6514)SOC workstations, ticketing system
User ZoneWorkstations, BYOD, IoTInternet (post-auth), corporate apps (per policy)Network Infrastructure Zone (802.1X only pre-auth)

4.5 High Availability and Disaster Recovery

The identity authentication system must achieve an availability target of 99.9% or higher, as authentication downtime directly impacts all network-connected users and devices. The HA architecture employs multiple layers of redundancy: active-active RADIUS clustering with load balancing, AD multi-master replication, PKI sub-CA clustering, and geographic redundancy for critical components. The disaster recovery plan defines RTO and RPO targets for each component, with automated failover for critical services and documented manual procedures for less critical components.

ComponentHA ModelRTO TargetRPO TargetFailover Trigger
RADIUS ClusterActive-Active (N+1)< 30 s0 (stateless)Node health check failure
AD/LDAPMulti-master replication< 60 s< 15 min replication lagDC unavailability
PKI Sub-CAActive-Standby cluster< 5 min0 (HSM-backed)Primary CA failure
NAC EngineActive-Standby< 2 min< 5 min (session state)Primary failure
TACACS+ ServerActive-Standby< 60 s0 (stateless)Primary failure