Network_access_control

Network_access_control - Network Access Control From...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Network Access Control From Wikipedia, the free encyclopedia (Redirected from Network access control ) Jump to: navigation , search The neutrality of this article is disputed . Please see the discussion on the talk page . Please do not remove this message until the dispute is resolved. (December 2007) This article may require cleanup to meet Wikipedia's quality standards . Please improve this article if you can. (August 2009) Network Access Control (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus , host intrusion prevention , and vulnerability assessment ), user or system authentication and network security enforcement. [1] [2]
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Contents 1 Backgr ound 1 . 1 I n p l a i n E n g l i s h 1 . 2 G o a l s o f N A C 2 Concep ts 2 . 1 P r
Background image of page 2
[ edit ] Background Network Access Control (NAC) is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to a network nodes by devices when they initially attempt to access the network.[ citation needed ] NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access) into the network systems, allowing the network infrastructure such as routers, switches and firewalls to work together with back office servers and end user computing equipment to ensure the information system is operating securely before interoperability is allowed. Network Access Control aims to do exactly what the name implies—control access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do. "NAC's roots trace back to the trusted computing movement. In this context an open-architecture was created as an alternative to proprietary NAC initiatives. TNC-WG aims at enabling network operators to provide endpoint integrity at every network connection, thus enabling interoperability among multi-vendor network endpoints." [3] Initially 802.1x was also thought of as NAC. Some still consider 802.1x as the most simple form of NAC, but most people think of NAC as something more. [ edit
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 7

Network_access_control - Network Access Control From...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online