Chapter 5: Selection & Interfaces

Core product introduction, typical wiring diagrams, interface logic, and product function comparison tables

Selecting the right products for a network identity authentication system requires evaluating performance, scalability, integration capabilities, and vendor support. This chapter introduces the six core product categories, presents their typical wiring and interface logic, and provides comprehensive function comparison tables to guide procurement decisions. Each product category is evaluated against a standardized set of criteria relevant to enterprise identity authentication deployments.

5.1 Core Product Introduction

The six core product categories form the foundation of every enterprise identity authentication system. Each category serves a distinct function in the authentication chain, from directory services and certificate issuance to network enforcement and audit logging. The following product showcase illustrates representative appliances from each category, with key specifications and deployment roles.

Core Product Showcase
Figure 5.1: Core Product Showcase — Six product categories: RADIUS/AAA Server (1U rack), Network Access Control appliance (2U rack), PKI/CA Server (rack), Enterprise Access Switch (802.1X capable), Wireless Controller (1U), and PAM Jump Server (rack)
Product CategoryPrimary FunctionKey ProtocolsForm FactorHA Model
RADIUS/AAA ServerAuthentication, Authorization, AccountingRADIUS (UDP 1812/1813), EAP, CoA (UDP 3799)1U rack appliance or VMActive-Active cluster
Network Access Control (NAC)Device profiling, posture assessment, policy enforcementSNMP, DHCP, HTTP, REST API2U rack appliance or VMActive-Standby
PKI/CA ServerCertificate issuance, revocation, OCSPSCEP, EST, OCSP, CRL (HTTP/HTTPS)Rack appliance + HSMSub-CA clustered; offline root
Enterprise Access Switch802.1X authenticator, VLAN enforcement, PoE802.1X, RADIUS, SNMP, SSH, NETCONF1U/2U rack switchStacking or VSS
Wireless ControllerSSID management, EAP proxy, VLAN assignmentCAPWAP, RADIUS, 802.1X, SNMP1U rack appliance or cloudActive-Standby or N+1
PAM Jump ServerPrivileged session brokering, credential vault, recordingSSH, RDP, HTTPS, TACACS+, LDAP2U rack appliance or VMActive-Standby

5.2 Typical Wiring and Interface Logic

The interface logic diagram illustrates the physical port layout of the RADIUS/AAA server and its logical connections to all integrated systems. Understanding the interface mapping is essential for firewall rule creation, network segmentation, and troubleshooting. Each interface serves a specific function, and mixing authentication traffic with management traffic on the same interface is a security anti-pattern that must be avoided.

RADIUS Server Interface and Connection Logic
Figure 5.2: RADIUS Server Interface and Connection Logic — Front panel ports (MGMT, AUTH1 UDP 1812, ACCT UDP 1813, CoA UDP 3799, LDAP TCP 389/636) with logical connections to AD/LDAP, PKI/CA (OCSP), Switches/APs (RADIUS), SIEM (Syslog TLS 6514), and NTP (UDP 123)
InterfaceProtocolPortDirectionConnected SystemSecurity Requirement
MGMTSSH, HTTPS22, 443InboundPAM Jump Server onlyMFA required; IP whitelist enforced
AUTH1RADIUSUDP 1812InboundSwitches, WLC, VPNRADIUS shared secret ≥ 32 chars; IP whitelist
ACCTRADIUS AccountingUDP 1813InboundSwitches, WLC, VPNSame shared secret as AUTH1
CoARADIUS CoAUDP 3799OutboundSwitches, WLCSeparate shared secret; IP whitelist on switch
LDAPLDAPSTCP 636OutboundAD/LDAP ServerTLS required; certificate validation enforced
OCSPHTTPTCP 80OutboundPKI/CA OCSP ResponderInternal CA only; no internet OCSP
SyslogSyslog/TLSTCP 6514OutboundSIEMTLS mutual auth; CEF format
NTPNTPUDP 123OutboundInternal NTP ServerNTP authentication (MD5/SHA1)

5.3 Core Product Function Comparison

The following tables provide detailed function comparisons across the key product categories. These comparisons are designed to support procurement decisions by highlighting the functional differences between product tiers and vendors. Organizations should evaluate products against their specific scenario requirements identified in Chapter 3, using these tables as a structured scoring framework.

5.3.1 RADIUS/AAA Server Feature Matrix

FeatureBasic TierStandard TierEnterprise TierRequirement Level
EAP-TLS supportYesYesYesMandatory
EAP-TTLS / PEAPYesYesYesRecommended (BYOD)
LDAP/AD integrationBasic LDAPLDAP + AD groupsFull AD + SAML + OIDCMandatory
Dynamic VLAN assignmentYesYesYes + policy engineMandatory
CoA (RFC 5176)LimitedYesYes + automationMandatory
OCSP/CRL integrationCRL onlyOCSP + CRLOCSP stapling + CRLMandatory (OCSP)
Auth throughput500 auth/s2,000 auth/s10,000+ auth/sSize to peak × 1.3
ClusteringNoActive-StandbyActive-Active N+1Mandatory (Active-Active)
REST APINoRead-onlyFull CRUD + webhooksRecommended
SIEM integrationSyslog UDPSyslog TLSSyslog TLS + CEF + APIMandatory (TLS)

5.3.2 NAC Platform Feature Matrix

FeatureBasic TierStandard TierEnterprise TierRequirement Level
DHCP fingerprintingYesYesYes + ML profilingMandatory
SNMP OID profilingLimitedYesYes + custom OIDRecommended
HTTP user-agent profilingNoYesYes + passive TLSRecommended
MDM/EDR integrationNoAPI (1–2 vendors)API (multi-vendor)Mandatory for BYOD
Captive portalBasicCustomizableFull branding + sponsorMandatory (guest)
Posture assessmentNoBasic (OS, AV)Full (OS, AV, patch, EDR)Recommended
CoA enforcementYesYesYes + automationMandatory
Concurrent sessions5,00025,000100,000+Size to peak × 1.3

5.3.3 PAM Platform Feature Matrix

FeatureBasic TierStandard TierEnterprise TierRequirement Level
SSH session brokeringYesYesYes + protocol isolationMandatory
RDP session brokeringNoYesYes + protocol isolationRecommended
Credential vaultBasicYes + rotationYes + HSM + rotationMandatory
Session recordingText log onlyVideo + textVideo + text + OCR searchMandatory (video)
MFA enforcementTOTP onlyTOTP + pushFIDO2 + TOTP + pushMandatory
TACACS+ integrationNoYesYes + command-levelMandatory
Break-glass workflowManualAutomated + approvalAutomated + approval + reviewMandatory
SIEM integrationSyslogSyslog TLS + CEFSyslog TLS + CEF + APIMandatory (TLS)