Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network Access Control Mar 8, 2011. Why Network Access Control Prevent unauthorized users from accessing OU resources. Prevent unsafe devices from providing.

Similar presentations


Presentation on theme: "Network Access Control Mar 8, 2011. Why Network Access Control Prevent unauthorized users from accessing OU resources. Prevent unsafe devices from providing."— Presentation transcript:

1 Network Access Control Mar 8, 2011

2 Why Network Access Control Prevent unauthorized users from accessing OU resources. Prevent unsafe devices from providing a launch pad for cyber attacks. Identify vulnerable devices and inform their users so that corrective action could be taken. Network Access Control is a mechanism for enforcing network access to Authorized and Guest users with Safe devices.

3 Challenges facing NAC Addition of new devices every year. Inability to physically secure all network ports. Presence of a wide variety of devices on the network. Emergence of new vulnerabilities. Need for a smooth user experience while enforcing access control.

4 NAC Solutions Cisco Bradford Juniper Netreg – Implemented successfully in many universities (e.g., CMU, Duke, Boston University, Notre Dame, Iowa State, Southwestern)

5 Benefits of Netreg Active – Associate every device on the wired network with an authorized user. – Identify the location of each wired device down to a room and port jack. Reactive – Scan every new device when it enters the network. – Provide mechanism for forcing remediation on or blacklist a device. – Provide mechanism for forcing a device out of the production network. Preventive – Prevent rogue DHCP servers from handing out addresses. – Prevent static address squatting.

6 NetReg Flow Remediation Devices Blacklist Devices Temp Authorized Devices Unregistered Devices Register Authorized Devices Students FacStaff Guests SCANSCAN

7 NetReg from a Users’ perspective Auto Registration – Users with OHIO ID – Guests with Guest ID Manual Registration – Pre-registration of laptops/desktops – Registration of browser-less devices (like gaming devices and printers) – View the list of devices registered to a user – Unregister a device

8 NETREG DEMO

9 Further steps Complete development – User Interface – Admin Applications – Device Vulnerability Classification Procedure Deployment – Pilot – Rollout Communication with each department Implementation Follow-up


Download ppt "Network Access Control Mar 8, 2011. Why Network Access Control Prevent unauthorized users from accessing OU resources. Prevent unsafe devices from providing."

Similar presentations


Ads by Google