answersLogoWhite

0

NAC is a centralised method for controlling network security.

It is based on the following procedures.
  1. Detect - Detection and identification of new devices connecting to the network
  2. Authenticate - Authentication of users and/or devices
  3. Assess - Assessment of end systems regarding their compliance and/or vulnerabilities
  4. Authorise - Authorisation to use the network based on the results of the authentication and the assessment
  5. Monitor - Monitoring users and devices once they are connected to the network
  6. Contain - Quarantine problem end systems and/or users to prevent them from negatively impacting the overall network environment
  7. Re-mediate - Re-mediation of problems with the end system and/or user
User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

Mechanisms used on Ethernet networks to control access to transmission medium?

Csma/cd


Logical access control method can be used to limit access to specific resources in a domain environment?

Access control list (ACL)


What is the use of a control network?

A control network is used to control other networks. The networks have their own structure but are controlled remotely by another network connected by a gateway.


What is the use of a network?

A control network is used to control other networks. The networks have their own structure but are controlled remotely by another network connected by a gateway.


What was used for error detection in ATM networks?

CRC is used for this purpose. The control field is HEC (header error control).


A popular OS used to control networks and to support applications used on the internet?

pownage?


What are the popular os used to control networks and support applications used on the internet?

Unix


Remote access connection manager?

Remote Access Connection Manager is a Windows service used to control access to the Internet and other remote networks. Remote Access Connection Manager can be started or stopped using the services.msc tool.


Which access method is used in Token Ring?

Token Passing


What type of access method is used by ALOHA-net?

WiFi


What were the method of control used by the revolutionary elite to control disobedient and rebellious colonist?

One method of control used by the elite on rebellious colonists was to charge people with anger towards the British.


What media access method is used to provide media access in WLANs?

n,knkjhkjn ,bmvjhgfjhghjbhvg