Get current news, industry tips and helpful information
Dynamic NAC turns ordinary PCs into enforcers that monitor the network and stop rogues from gaining access, without changes to the network. Authorization can be based on endpoint identity, posture, and being white listed. Authentication can be required too.
Dynamic NAC consists of a Dynamic NAC agent and a Dynamic NAC server. The agent is loaded onto one or more PCs and audits with the server. Some agents become enforcers that control access to the network. The server lets enforcers know which devices are unauthorized, so the enforcers can quarantine and restrict them.
If a rogue or non-compliant device is detected, enforcers block network access by redirecting or terminating its traffic. If the enforcer reports an unhealthy devices to the server, the policy will typically be configured to remediates the device or walk the user through the remediation procedure.
By using existing PCs as enforcers, Dynamic NAC easily scales for lage enterprises without additional network equipment. Once deployed, the server provides administrators with centralized management of policies, enforcement, and remediation actions.