This video discussed the Network Access Control (NAC) including its architecture and components and concepts. Pre-Admission Control 1. System/ User profiling (Agent/Agentless) 2. System/ User Authentication (device profile, captive-P) 3. Compliance/Security Posture Checking (BYOD at Hot-Spot) a. Anti-virus (prevent x-contamination) b. System Patch c. System Configuration d. Auto Remediation Post-Admission Control 1. System/ User Authorization (compliance results) 2. Role-based Access Control (RBAC) - HR to HR Network Deployment Options Inline: All-in-one (Firewall+NAC+Agentless,easy,new) Out-of-Band: (Remote, Agent+Agentless, existing) Quarantine VLAN, Captive Portal, ARP/NDP Poisoning Mobile NAC: Warn if low, Download once WIFI /Wired Advantages 1. Counters Zero-Days Attacks 2. Network AAA, RBAC 3. Enforce Secure Network Protocols (e.g. EAP-TLS) 4. Integration with other Security Tools (NOC/SOC)











