From the course: Cert Prep: ISC2 Certified in Cybersecurity (CC)
Unlock this course with a free trial
Join today to access over 23,200 courses taught by industry experts.
Network access control
From the course: Cert Prep: ISC2 Certified in Cybersecurity (CC)
Network access control
- [Instructor] Network administrators need to restrict network access to authorized users and devices and ensure that users only have access to resources appropriate to their role in the organization. That's where technology called network access control or NAC comes into play. NAC technology intercepts network traffic coming from devices that connect to a wired or wireless network and verifies that the system and user are authorized to connect to the network before allowing them to communicate with other systems. NAC often uses an authentication protocol called 802.1x to perform these access control tasks. Let's take a look at how that works. There are three systems involved in any 802.1x transaction. The first is the device that wishes to connect to the NAC protected network. This device must be running a special piece of software called a supplicant. The supplicant is responsible for performing all of the NAC related…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Data center protection5m 16s
-
(Locked)
Security zones3m 54s
-
(Locked)
Routers and switches2m 56s
-
(Locked)
VLANs and network segmentation2m 19s
-
(Locked)
Firewalls6m 20s
-
(Locked)
VPNs and VPN concentrators4m 41s
-
(Locked)
Network access control4m 36s
-
(Locked)
Internet of Things3m 5s
-
(Locked)
Securing IoT devices3m 8s
-
(Locked)
Network security for smart devices1m 58s
-
(Locked)
-
-
-
-