This lecture begins with the discussion of network security, focusing on network access control. We begin with an overview of network access control systems, summarizing the principal elements and techniques involved in such a system. Next, we discuss the Extensible Authentication Protocol and IEEE 802.1X, two widely implemented standards that are the foundation of many network access control systems.
Network access control (NAC) is an umbrella term for managing access to a network. It is all about managing network access. It verifies user identities, controls data access, and assesses the health of devices connecting to the network. NAC involves:
A variety of different ARs seek access to an enterprise network by applying to some type of NAS. It validates the AR's identity to determine access privileges. Session keys may be established for future secure communication.
Figure 6.1 Network access control context.
The policy server assesses ARs for compliance with organization security standards before granting access.
Enforcement methods are the actions that are applied to ARs to regulate access to the enterprise network. The following are common NAC enforcement methods: