From the course: CISSP Cert Prep (2021): 4 Communication and Network Security

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Network access control

Network access control

From the course: CISSP Cert Prep (2021): 4 Communication and Network Security

Start my 1-month free trial

Network access control

- [Instructor] Network administrators need to restrict network access to authorize users and devices and ensure that users only have access to resources appropriate to their role in the organization. That's where technology called Network Access Control or NAC comes into play. NAC technology intercepts network traffic coming from devices that connect to a wired or wireless network and verifies that the system and user are authorized to connect to the network before allowing them to communicate with other systems. NAC often uses an authentication protocol called 802.1x to perform these access control tasks. Let's take a look at how that works. There are three systems involved in any 802.1x transaction. The first is the device that wishes to connect to the NAC protected network. This device must be running a special piece of software called a supplicant. The supplicant is responsible for performing all of the NAC related…

Contents