Network Access Control

Network Access Control

Network Access Control (NAC) is an approach to computer network security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.[1][2]



Network Access Control (NAC) is a computer networking solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network.[citation needed] NAC might integrate the automatic remediation process (fixing non-compliant nodes before allowing access) into the network systems, allowing the network infrastructure such as routers, switches and firewalls to work together with back office servers and end user computing equipment to ensure the information system is operating securely before interoperability is allowed.

Network Access Control aims to do exactly what the name implies—control access to a network with policies, including pre-admission endpoint security policy checks and post-admission controls over where users and devices can go on a network and what they can do.

Initially 802.1X was also thought of as NAC. Some still consider 802.1X as the most simple form of NAC, but most people think of NAC as something more.[citation needed]

In plain English

When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined policy, including anti-virus protection level, system update level and configuration. While the computer is being checked by a pre-installed software agent, it can only access resources that can remediate (resolve or update) any issues. Once the policy is met, the computer is able to access network resources and the Internet, within the policies defined within the NAC system. NAC is mainly for Role based Access. Access to the network will be given according to profile of the person. For example, in an enterprise, HR department could access only HR department file.

Goals of NAC

Because NAC represents an emerging category of security products, its definition is both evolving and controversial. The overarching goals of the concept can be distilled to:

Mitigation of zero-day attacks
The key value proposition of NAC solutions is the ability to prevent end-stations that lack antivirus, patches, or host intrusion prevention software from accessing the network and placing other computers at risk of cross-contamination of computer worms.
Policy enforcement
NAC solutions allow network operators to define policies, such as the types of computers or roles of users allowed to access areas of the network, and enforce them in switches, routers, and network middleboxes.
Identity and access management
Where conventional IP networks enforce access policies in terms of IP addresses, NAC environments attempt to do so based on authenticated user identities, at least for user end-stations such as laptops and desktop computers.


Pre-admission and post-admission

There are two prevailing design philosophies in NAC, based on whether policies are enforced before or after end-stations gain access to the network. In the former case, called pre-admission NAC, end-stations are inspected prior to being allowed on the network. A typical use case of pre-admission NAC would be to prevent clients with out-of-date antivirus signatures from talking to sensitive servers. Alternatively, post-admission NAC makes enforcement decisions based on user actions, after those users have been provided with access to the network.

Agent versus agentless

The fundamental idea behind NAC is to allow the network to make access control decisions based on intelligence about end-systems, so the manner in which the network is informed about end-systems is a key design decision. A key difference among NAC systems is whether they require agent software to report end-system characteristics, or whether they use scanning and network inventory techniques to discern those characteristics remotely.

As NAC has matured, Microsoft now provides their network access protection (NAP) agent as part of their Windows 7, Vista and XP releases. There are NAP compatible agents for Linux and Mac OS X that provide near equal intelligence for these operating systems.

Out-of-band versus inline

In some out-of-band systems, agents are distributed on end-stations and report information to a central console, which in turn can control switches to enforce policy. In contrast the inline solutions can be single-box solutions which act as internal firewalls for access-layer networks and enforce the policy. Out-of-band solutions have the advantage of reusing existing infrastructure; inline products can be easier to deploy on new networks, and may provide more advanced network enforcement capabilities, because they are directly in control of individual packets on the wire. However, there are products that are agentless, and have both the inherent advantages of easier, less risky out-of-band deployment, but use techniques to provide inline effectiveness for non-compliant devices, where enforcement is required

Remediation, quarantine and captive portals

Network operators deploy NAC products with the expectation that some legitimate clients will be denied access to the network (if users never had out-of-date patch levels, NAC would be unnecessary). Because of this, NAC solutions require a mechanism to remediate the end-user problems that deny them access.

Two common strategies for remediation are quarantine networks and captive portals:

A quarantine network is a restricted IP network that provides users with routed access only to certain hosts and applications. Quarantine is often implemented in terms of VLAN assignment; when a NAC product determines that an end-user is out-of-date, their switch port is assigned to a VLAN that is routed only to patch and update servers, not to the rest of the network. Other solutions use Address Management techniques (such as Address Resolution Protocol (ARP) or Neighbor Discovery Protocol (NDP)) for quarantine, avoiding the overhead of managing quarantine VLANs.
Captive portals
A captive portal intercepts HTTP access to web pages, redirecting users to a web application that provides instructions and tools for updating their computer. Until their computer passes automated inspection, no network usage besides the captive portal is allowed. This is similar to the way paid wireless access works at public access points.
External Captive Portals allow organizations to offload wireless controllers and switches from hosting web portals. A single external portal hosted by a NAC appliance for wireless and wired authentication eliminates the need to create multiple portals, and consolidates policy management processes.

Mobile NAC

Using NAC in a mobile deployment, where workers connect over various wireless networks throughout the workday, involves challenges that are not present in a wired LAN environment. When a user is denied access because of a security concern, productive use of the device is lost, which can impact the ability to complete a job or serve a customer. In addition, automated remediation that takes only seconds on a wired connection may take minutes over a slower wireless data connection, bogging down the device.[3] A mobile NAC solution gives system administrators greater control over whether, when and how to remediate the security concern.[4] A lower-grade concern such as out-of-date antivirus signatures may result in a simple warning to the user, while more serious issues may result in quarantining the device.[5] Policies may be set so that automated remediation, such as pushing out and applying security patches and updates, is withheld until the device is connected over a Wi-Fi or faster connection, or after working hours.[3] This allows administrators to most appropriately balance the need for security against the goal of keeping workers productive.[5]



Some NAC software, such as Impulse SafeConnect, require the installation of a client agent. This agent is used to verify that the user is in compliance with the site network access agreement. This allows for locking down network access to any client running unauthorized software, unmaintained updates, or for any other violation detected.

File Sharing

Some colleges and universities used NAC systems in order to ban illegal, as well as legal, file sharing applications.

Network Speed

Implementing a NAC requires additional resources and expenses. This reduces access times and uses bandwidth.

See Also


External links

Wikimedia Foundation. 2010.

Look at other dictionaries:

  • Network Access Control — Network Admission Control (NAC) ist eine Technologie, die die Abwehr von Viren und Würmern aus dem Netzwerk heraus unterstützt. Mit NAC werden Endgeräte während der Authentisierung auf Richtlinienkonformität geprüft. Ist z. B. der Virenscanner… …   Deutsch Wikipedia

  • Network Access Control — Pour les articles homonymes, voir NAC. Un Contrôleur d accès au réseau (Network Access Control ou NAC) est une méthode informatique permettant de soumettre l accès à un réseau d entreprise à un protocole d identification de l utilisateur et au… …   Wikipédia en Français

  • Port Based Network Access Control — Seit 2001 gibt es den Standard IEEE 802.1X, der Port Based Network Access Control bei Netzwerken nachrüstet. Diese können drahtlos (WLANs) oder drahtgebunden (Ethernet) sein. Die Authentifizierung der Benutzer erfolgt dabei über das Extensible… …   Deutsch Wikipedia

  • Network Admission Control — (NAC) refers to Cisco s version of Network Access Control, which restricts access to the network based on identity or security posture. When a network device (switch, router, wireless access point, DHCP server, etc.) is configured for NAC, it can …   Wikipedia

  • Network Admission Control — (NAC) se réfère à la version de Cisco de Network Access Control, qui permet de restreindre l accès à un réseau informatique. Lorsqu un équipement réseau est configuré avec NAC, il peut forcer l utilisateur ou la machine à s authentifier afin d… …   Wikipédia en Français

  • Network Admission Control — (NAC) ist eine Technologie, die die Abwehr von Viren und Würmern aus dem Netzwerk heraus unterstützt. Mit NAC werden Endgeräte während der Authentisierung auf Richtlinienkonformität geprüft. Ist z. B. der Virenscanner nicht aktuell oder… …   Deutsch Wikipedia

  • Network traffic control — In computer networking, network traffic control is the process of managing, prioritising, controlling or reducing the network traffic, particularly Internet bandwidth, used by network administrators, to reduce congestion, latency and packet loss …   Wikipedia

  • Network Access Protection — (NAP) is a Microsoft technology for controlling network access of a computer host based on the system health of the host, first introduced in Windows Server 2008. With Network Access Protection, system administrators of an organization s computer …   Wikipedia

  • Network Access Protection — (NAP) est une technique de Microsoft en partenariat avec Cisco pour contrôler l accès au réseau d un ordinateur en se basant sur la santé de son système. Elle est utilisée sur les systèmes d exploitation Windows Vista et Windows Server 2008. Elle …   Wikipédia en Français

  • Access Control List — Muster einer ACL Eine Access Control List, auch ACL, deutsch Zugriffssteuerungsliste, ist eine Software Technik, mit der Betriebssysteme und Anwendungsprogramme Zugriffe auf Daten und Funktionen eingrenzen können. Eine ACL legt fest, welcher… …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”