Network Access Control protects networks from unau­tho­rized access and damage. NAC works in the back­ground before access and after access.

What is Network Access Control?

Network Access Control, also known as NAC, is a tool which protects private networks and prevents unau­tho­rized access from external devices who do not meet the security policies. NAC solutions perform two important tasks to achieve this.

Pre-admission NAC

Network Access Control has a complete overview over the devices which are connected to a network. The type of device does not matter, which means computers, smart­phones, printers, scanners or any object as­so­ci­at­ed with the Internet of Things are included. The goal is to prohibit third-party systems from accessing the internal network through Wi-Fi or other means. This type of Network Access Control is called pre-admission NAC and it aims to maintain the security ar­chi­tec­ture.

Post-admission NAC

The com­pli­ance feature checks devices which are already within the network and iden­ti­fies possible problem sources or security leaks as early as possible. For example, the Network Access Control checks the firewall status and the antivirus program to ensure that only up to date devices are in the network. This feature is part of the post-admission NAC and it monitors specific areas within a network.

How does Network Access Control work?

There are several different NAC systems which work in different ways. Network Access Control works in a similar way to the other systems. This involves a company’s security team or the person re­spon­si­ble for a network es­tab­lish­ing mandatory rules for all devices in the network. Network Access Control reviews and cat­e­go­rizes new devices. Access to the network is granted or denied based on if the device meets the security criteria. A device with access is given specific per­mis­sions and is audited regularly. This maintains the network’s security.

Why is Network Access Control important?

Although NAC is not suitable for every network, it is important for companies and larger networks. The tech­nol­o­gy provides a complete overview of every device in the network and prevents unau­tho­rized persons from gaining access. Network Access Control helps create and maintain all relevant security policies. It also allows rights and roles to be assigned. If a device on the network is not operating in com­pli­ance with the policy, they can be quar­an­tined and re­ac­ti­vat­ed once the errors have been corrected.

What are the functions of Network Access Control?

Network Access Control uses several methods and features to protect a network before access and after access. The most common tech­nolo­gies include:

Security policies for NAC

Every network should have stringent security policies for all devices and ap­pli­ca­tion scenarios, but different pre­req­ui­sites and au­tho­riza­tions should be taken into account. NAC solutions allow you to choose these policies in advance and adjust them as needed after the network has been set up, based on the policies defined, devices are con­trolled before and during access.

Profiling for NAC

During profiling, Network Access Control scans all devices, checks their prop­er­ties and compares their IP addresses. This ensures that all devices in the network can be detected and scanned for security breaches.

Sensors for Network Access Control

Even devices which are au­tho­rized can cause damage to a network by in­ten­tion­al­ly or un­in­ten­tion­al­ly violating the internal rules. Sensors work as software com­po­nents or directly on access points. Sensors monitor the data traffic within a network or specific sub-areas in real time and prevent vi­o­la­tions.

Network Access Control agents

Network Access Control agents are software installed on end devices. These agents com­mu­ni­cate with a central NAC hub and grant the end devices access to the network. The advantage of this method is that only pre­vi­ous­ly selected and au­tho­rized devices are granted access. The dis­ad­van­tage is that each device must have an agent. This can be very time-consuming, es­pe­cial­ly for very large networks. Microsoft and Cisco offer a trust agent for the NAC variant Network Admission Control.

Temporary agents are also an option. Temporary agents do not have to be per­ma­nent­ly installed and they are au­to­mat­i­cal­ly deleted when the system is restarted. These are usually loaded on a browser and sub­scriber’s express consent is required. This in­ter­me­di­ate solution is suitable for temporary, one-time or sporadic access to a network. However, other methods of Network Access Control are more practical for long-term use.

VLAN solutions for NAC

Many NAC tools use Virtual Local Area Networks to create subareas which are only certain devices can access. This allows sensitive areas to be separated from public or largely public segments.

LADP di­rec­to­ries for grouping

With LDAP di­rec­to­ries, Network Access Control creates groups for dividing users. Each group receives certain rights and access to certain parts of the network or all areas. This also makes it possible to give access to in­di­vid­u­als rather than the end device.

What are ap­pli­ca­tion scenarios for Network Access Control?

There are several ap­pli­ca­tion scenarios for Network Access Control. Not every solution is suitable for every purpose. The following ap­pli­ca­tion scenarios are most common:

Bring Your Own Device

Bring Your Own Device or BYOD is a practice used by most networks. Simply put, BYOD means that people can dial into a network with their own end device. This can be a smart­phone in the office or their own laptop in the uni­ver­si­ty’s network. However, so many different devices can pose great chal­lenges for the in­fra­struc­ture and security. Network Access Control is actually critical to pro­tect­ing sensitive data from malware and main­tain­ing an overview.

Guest access to systems

Guests or people from outside a company may also need access to a system. This may only take place spo­rad­i­cal­ly or just once, but a good con­nec­tion and security policies are also par­tic­u­lar­ly important here. This is another reason why a well-planned Network Access Control is crucial.

Internet of Things

More and more devices can gain access to a network through the Internet of Things. These devices are not always kept up to date or are checked regularly. A good NAC strategy ensures that these devices do not open a gateway for unau­tho­rized persons.

Network Access Control in health­care

Security is a top priority in the health­care sector. Devices must function properly, and data must be protected at all costs. It is important that the network has no weak points. The right Network Access Control is therefore also of great im­por­tance here.

Go to Main Menu