Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
50% found this document useful (2 votes)
325 views

Network Access Control: Software and Harware

Network Access Control (NAC) is an approach that enforces security policies on devices connecting to a network. NAC allows only compliant devices like PCs and laptops onto the network, restricting noncompliant devices and limiting potential damage from security threats. NAC provides a role-based method of preventing unauthorized access and improving network resiliency. The document discusses using Cisco routers, switches, and Packet Tracer to design and configure ACLs on a network to enforce baseline security policies, control guest access, implement role-based access control, and prevent worms from spreading.

Uploaded by

anurag_0290
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
325 views

Network Access Control: Software and Harware

Network Access Control (NAC) is an approach that enforces security policies on devices connecting to a network. NAC allows only compliant devices like PCs and laptops onto the network, restricting noncompliant devices and limiting potential damage from security threats. NAC provides a role-based method of preventing unauthorized access and improving network resiliency. The document discusses using Cisco routers, switches, and Packet Tracer to design and configure ACLs on a network to enforce baseline security policies, control guest access, implement role-based access control, and prevent worms from spreading.

Uploaded by

anurag_0290
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Network Access Control

Introduction:
Network Access Control (NAC) is an approach for enforcing our organization's security policies on all devices seeking network access. Network Access Control (NAC) allows only compliant and trusted endpoint devices, such as PCs, Laptops, and PDAs, onto the network, restricting the access of noncompliant devices, and thereby limiting the potential damage from emerging security threats and risks. NAC will provide a powerful, roles-based method of preventing unauthorized access and improving network resiliency.
Software and Harware: 1. 2. 3. 4. Cisco ios firewall router Cisco switch Computers Cisco packet tracer(optional)

Project Study Area: 1. 2. 3. 4. 5. Objectives :


1. Enforcing baseline security policy 2. Access Control of network guest/contractors 3. Role based access 4 . Keep Worms Out

ACl Design Different types of ACL Attack prevented by configuring ACL ACL configuration guidline on cisco router and switches Perform dynamic routing by(routing protocol)

Submitted by: Utsav mazumdar Ravi ranjan kumar Raghvemdra kumar Satrughan singh

You might also like