Network Access Control (NAC) (obj 2.2) Flashcards
(20 cards)
What does NAC stand for?
Network Access Control
NAC is a method for increasing network security by inspecting devices before granting them access.
What is the primary purpose of the NAC process?
To inspect devices as they connect to determine if they are secure enough for access.
What happens to devices during the NAC process?
Devices are isolated and inspected based on NAC configurations.
What is Port Security?
Secures physical network ports to prevent unauthorized access.
What does Port Security limit?
Limits the number of devices that can connect to a network switch or hub.
How can Port Security be configured?
To allow specific MAC addresses or a set of specified MAC addresses.
What is MAC Filtering?
Controls access to the network based on devices’ unique MAC addresses.
What does MAC Filtering maintain?
A list of approved MAC addresses.
What is the difference between allow listing and block listing in MAC Filtering?
- Allow listing: Only approved MAC addresses allowed
- Block listing: All devices allowed except those on the list.
What does 802.1X Authentication provide?
An authentication framework for networks.
What does 802.1X Authentication ensure?
Only authenticated users can access network services.
What protocol does 802.1X encapsulate?
Extensible Authentication Protocol (EAP).
What are the three components of 802.1X Authentication?
- Supplicant – user device
- Authenticator – network device
- Authentication server – authenticates user device.
What type of agents can be used in NAC implementation?
- Persistent agents for company-provided computers
- Non-persistent agents for personally owned devices.
What happens to devices that fail inspection in the NAC process?
They are either denied access or placed in a quarantine zone for further remediation.
What is Time-based Access Control?
Limits network access based on specified hours.
What is Location-based Access Control?
Verifies the physical location of the device.
What is Role-based Access Control?
Grants permissions based on user roles.
What is Rule-based Access Control?
Grants or denies access based on predefined rules.
What are the benefits of NAC?
- Strengthens network security by ensuring only authenticated devices can access the network
- Provides a scalable solution for modern and diverse network infrastructures.