This is where Network Access Control (NAC) provides a
solution. NAC allows network administrators to automate
policy enforcement - rather than requesting that users ensure
their devices conform to anti-malware policies, let the network
do the job instead.
Network Access Control has very quickly become an industry
requirement and much more than a new buzzword for network
professionals.
NAC offers an excellent way to control network
access with automated policy enforcement, and manage network
security without vast administration overhead.
Put simply, NAC enables you to define a comprehensive security
policy for your network, implement that policy on a centralized
server, and have the network automatically enforce that policy on
all network users. NAC is much more than just user authentication,
it is also designed to protect the network from users and devices
that may be authorised, but pose other threats.The most sensible
place for this to occur is at the edge of the network, removing
security threats before they gain any form of access. A NAC
solution including switches that act as enforcement points ensures a
proactive approach to network security.
How NAC secures your network
Nowadays, network access for multiple device types or temporary
users is an expectation, not an exception.With this in mind, today's
enterprise network requirements include:
■ Some level of access no matter who or where you are
■ Access for guests such as sub-contractors, partners, remote
employees
■ Access control for a new range of network devices, such as
iPhone and BlackBerry devices, PDAs and digital cameras
Allied Telesis LAN switches meet these emerging requirements with
NAC features and integration. Used in conjunction with appropriate
server-side and client-side software tools, they can provide a
remarkable level of control over the security status of the devices
that connect to your network. Allied Telesis NAC implementation is
TCG/TNC (Trusted Computing Group - Trusted Network
Connect) standards-based to guarantee interoperability with the
major third party suppliers of NAC software, such as Microsoft and
Symantec.This provides customers with the confidence to create a
comprehensive NAC solution from trusted vendors.
At the heart of using NAC for your network security are three key
elements:
■ No (or very limited) access without identification
■ The quarantine and remediation of non-compliant devices
■ Setting the level of access to network resources based on a
device's authenticated identity
Allied Telesis Solutions: Network Access Control (NAC) | 3
NAC controls network access and security
with a minimum of staff overhead.