Download presentation
Presentation is loading. Please wait.
Published byMelvyn Evan Dorsey Modified over 8 years ago
1
Network Access Control Mar 8, 2011
2
Why Network Access Control Prevent unauthorized users from accessing OU resources. Prevent unsafe devices from providing a launch pad for cyber attacks. Identify vulnerable devices and inform their users so that corrective action could be taken. Network Access Control is a mechanism for enforcing network access to Authorized and Guest users with Safe devices.
3
Challenges facing NAC Addition of new devices every year. Inability to physically secure all network ports. Presence of a wide variety of devices on the network. Emergence of new vulnerabilities. Need for a smooth user experience while enforcing access control.
4
NAC Solutions Cisco Bradford Juniper Netreg – Implemented successfully in many universities (e.g., CMU, Duke, Boston University, Notre Dame, Iowa State, Southwestern)
5
Benefits of Netreg Active – Associate every device on the wired network with an authorized user. – Identify the location of each wired device down to a room and port jack. Reactive – Scan every new device when it enters the network. – Provide mechanism for forcing remediation on or blacklist a device. – Provide mechanism for forcing a device out of the production network. Preventive – Prevent rogue DHCP servers from handing out addresses. – Prevent static address squatting.
6
NetReg Flow Remediation Devices Blacklist Devices Temp Authorized Devices Unregistered Devices Register Authorized Devices Students FacStaff Guests SCANSCAN
7
NetReg from a Users’ perspective Auto Registration – Users with OHIO ID – Guests with Guest ID Manual Registration – Pre-registration of laptops/desktops – Registration of browser-less devices (like gaming devices and printers) – View the list of devices registered to a user – Unregister a device
8
NETREG DEMO
9
Further steps Complete development – User Interface – Admin Applications – Device Vulnerability Classification Procedure Deployment – Pilot – Rollout Communication with each department Implementation Follow-up
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.