• Home
  • HPE
    • HPE Aruba Wireless >
      • HPE Aruba Wireless Matrix
      • HPE Aruba Wireless Antenna Selector
      • HPE Aruba Wireless Selector
    • HPE Care Packs & Support >
      • Carepack Tool
      • HPE Support Documents
      • Proactive vs Foundation Care >
        • Foundation Care Datasheet
        • Proactive Care Datasheet
      • Training Services
      • Warranty Summary
    • HPE Config Tools >
      • HPE Competitive Comparison
      • HPE IRF Chart
      • HPE Online Configurator
      • HPE Power Cables
      • HPE SFP Compatibility Matrix
      • HPE Switch Selector
    • HPE EOS Information >
      • EOS Switches & Wireless
      • HP Legacy Wireless
      • HPE Console Cable Removal
      • HPE PartSurfer
  • Networking
    • Arista Switch Selector
    • B+B SmartWorx Industrial Switch Selector
    • Cables >
      • Connection Types
      • Fiber Cable Selector
      • International Power Cords
      • Netpatibles Copper Cables
    • Cisco Networking >
      • Cisco & Meraki Products
      • Cisco IOS Feature Comparison
    • Mellanox Switch Selector
    • Switch Selector
    • Time Server - Microsemi S600
    • WAN Virtualization
  • Network Security
    • All Vendors >
      • AppEnsure
      • Bitdefender
      • Check Point
      • Cisco >
        • Cisco Security Questions
      • ESET >
        • DESlock Encryption
        • ESET Secure Authentication (Two-Factor)
        • Safetica
      • Fortinet >
        • FortiAP & Wireless
        • FortiClient
        • FortiCloud/FortiAnalyzer
        • Fortinet Product Matrix
        • FortiRecorder and FortiCamera
        • Fortinet Services Explained
        • Fortinet Threat Map
      • Juniper
      • Pulse Secure
      • SonicWALL >
        • Analyzer, GMS, Capture
        • Capture ATP
        • SonicWALL HA Chart
      • Symantec
      • Sophos >
        • Endpoint Encryption
        • Endpoint Protection >
          • Sophos Server Protection
          • Sophos Endpoint EDR
          • Intercept X
        • SG Sizing >
          • SG Subscription Summary
        • XG Sizing >
          • iView Monitoring & Reporting
          • XG Subscription Summary
          • XG vs Competition
          • XG Sizing Legacy
        • Sophos Secure Email
        • Sophos Secure Wireless
        • Sophos Licensing Guidelines
      • Tenable
      • Trend Micro
      • WatchGuard >
        • Threat Detection and Response (TDR)
        • VPN & NCP Clients
        • WatchGuard EOL Upgrades
        • WatchGuard Licensing & Features Charts
        • WatchGuard Wireless
        • WSM & Dimension
      • ZyXEL >
        • Zyxel High Availability Pro
        • Zyxel Licensing
    • Current Firewall Matrix
    • Firewall Selector
    • Licensing Matrix
    • Security Line Card
    • Terminology >
      • Cloud Access Security Broker (CASB)
      • Data Loss Prevention (DLP)
      • Email Security
      • Endpoint Encryption
      • Endpoint Protection
      • Firewalls
      • High Availability
      • HIPAA Compliance
      • Mobile Device Management (MDM)
      • Network Access Control (NAC)
      • PCI Compliance
      • Ransomware
      • Sandboxing
      • Two Factor Authentication
      • Virtual Private Networks (VPN)
      • Vulnerability Assessments
  • Physical Security
    • Access Control
    • Analog Cable Lengths
    • Resolution Charts
    • FPS Comparison
    • Ingress Protection Rating
    • IK Raiting
    • Hikvision >
      • Hikvision Selector
      • Hikvision Bundles
      • Hikvision Naming Convention
    • IPConfigure
    • Milestone
    • Pixel Density
  • UCC
    • FortiVoice Compatibility Guide
    • Jabra Compatibility Guide
    • Plantronics Compatibility Guide
    • Sennheiser Headset Compatibility Guide
    • UC Amphenol Breakout
    • VXi Compatibility Guide
  • Wireless
    • Antenna Connections
    • dBi/dBm/Watts Chart
    • Ekahau
    • Fresnel Zone calculator
    • HPE Aruba Wireless
    • Ubiquiti
  • Questions
Tech Support Links

Network Access Control (NAC)

Network Access Control (NAC) is an approach to computer security that attempts to unify endpoint security technology (such as antivirus, host intrusion prevention, and vulnerability assessment), user or system authentication and network security enforcement.
​

Example of NAC:

​When a computer connects to a computer network, it is not permitted to access anything unless it complies with a business defined policy; including anti-virus protection level, system update level and configuration. While the computer is being checked by a pre-installed software agent, it can only access resources that can remediate (resolve or update) any issues. Once the policy is met, the computer is able to access network resources and the Internet, within the policies defined within the NAC system. NAC is mainly used for endpoint health checks, but it is often tied to Role-based Access. Access to the network will be given according to the profile of the person and the results of a posture/health check. For example, in an enterprise the HR department could access only HR department files if both the role and the endpoint meets anti-virus minimums.

Network Access Control Vendors
​
  • Cisco (Identity Services Engine - ISE)
  • HPE Aruba (ClearPass)
  • Pulse Secure (PolSec)
~ Updated Network Security Links ~
Updated: 3/26/2019
​
​Report Broken Links Here​