
Network Access Control: Securing and Managing Enterprise Networks
"Learn about the exponential growth of network devices, the importance of securing networks, challenges faced by enterprises, and the functions of Network Access Control (NAC) in maintaining network security and visibility. Explore NAC architecture and security posture for creating trusted enterprise networks with scalable policies. Enhance your understanding of user on-boarding, authentication, endpoint security, and real-time network intelligence insights provided by NAC."
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
UNINAC Network Controllers
Introduction Introduction Number of devices growing exponentially Networks are becoming increasingly vulnerable Identifying who and what connects to network becoming important Networks need to be secured internally and externally Today s network tools are not adequate to meet demands Need to Identify Threats, Enforce Policies and Protect networks Network Access Control provides full network visibility and control Helps become proactive rather than reactive 2
Explosion Explosion of Network Devices of Network Devices 3
Enterprise Enterprise Network Challenges Network Challenges BYOD Guest Access Infected Endpoints Employee On-boarding Malware / Virus Consistent Network Policies Network Security Multiple Login Schemes Network Challenges Management Cost Employee Productivity Help Desk Overload Network Downtime Network Complexity Process Overhead 4
Security Security Posture Posture Creating secure and trusted enterprise network Scalable and consistent security fabric Enforcing consistent policies in remote offices Keeping security transparent to end users Ensuring security is always on (high availability) Enforcing security for voice, data and mobility 5
NAC Functions NAC Functions User On-boarding & authentication (AAA) Guest Access Users Scanning & Profiling Endpoints Policy Enforcement Process Device Fingerprinting Endpoint Checks & Audits Security Tracking User Sessions & Activity Real-time Network Intelligence Insights 6
VPN Endpoints NAC Architecture NAC Architecture Internet Active Directory Unmanaged Endpoint Internet Firewall UniNac Controllers (1+1) Wireless AP 802.1x Auth Over Radius Managed Endpoint MAC ByPass Managed Switch 802.1x Auth Over Tunnel 802.1x Auth Over Radius Unmanaged BYOD Managed Switch Corporate LAN Non 802.1x Devices Policy Enforcement Data Center Firewall Managed Endpoint Server VLAN Data Center BYOD Endpoint 7
User On User On- -boarding boarding 4 3 UniNac Controller performs authentication of the device against LDAP, AD or local database User Traffic is redirected to UniNac Controller to verify credentials and authentication UniNac Controller Remediation Network LAN User Guests Corporate Network 802.1x User 5 1 2 If UniNac validates the device, the device traffic is allowed on the corporate network. If validation fails, User is redirected to remediation network Enterprise, Contractor or Guest user connects to network Trinity Switch or Falcon APs identify user profile and check if authentication is needed for user. (802.1x, MAC or Captive Portal0 8
NAC Users NAC Users BYOD Devices Wired Endpoint Guest Devices VPN Enterprise Devices Endpoints Non 8021.x Endpoints Wireless Endpoint 9
Enterprise Security Enterprise Security Dynamic VLAN Assignment Access Policies Endpoint Compliance Checks Network Intelligence 10
Benefits Benefits Enable BYOD while ensuring network security Quarantine Rogue and Malicious endpoints Control guest access and policies Protect registered devices Gain full network visibility Enforce network wide policies Profile devices and users Gain powerful insights 11