In a world where more and more services, of any kind, are made easily accessible through the network infrastructures, the management and monitoring of those who try to access these resources is of great importance. Through Network Access Control (NAC) technology, access to the network is guaranteed only to those who are authorized, by means of policies. This scenario is commonly referred to as policy-based access control. In addition to the use of authentication processes, 2 other features are used, namely profiling and posture. While the first identifies the type of device attempting to access (e.g., PC, printer, IP phone), the second identifies its health status. Through the implementation of these 3 functions, access to the network can be managed and monitored through different levels of granularity and above all with ease. The study of the thesis therefore focuses on the analysis and implementation of NAC in a test environment, to then be replicated also in the production environment.
In a world where more and more services, of any kind, are made easily accessible through the network infrastructures, the management and monitoring of those who try to access these resources is of great importance. Through Network Access Control (NAC) technology, access to the network is guaranteed only to those who are authorized, by means of policies. This scenario is commonly referred to as policy-based access control. In addition to the use of authentication processes, 2 other features are used, namely profiling and posture. While the first identifies the type of device attempting to access (e.g., PC, printer, IP phone), the second identifies its health status. Through the implementation of these 3 functions, access to the network can be managed and monitored through different levels of granularity and above all with ease. The study of the thesis therefore focuses on the analysis and implementation of NAC in a test environment, to then be replicated also in the production environment.
Analysis and deployment of a Network Access Control wired solution in an enterprise environment
BASSO, MARCO
2021/2022
Abstract
In a world where more and more services, of any kind, are made easily accessible through the network infrastructures, the management and monitoring of those who try to access these resources is of great importance. Through Network Access Control (NAC) technology, access to the network is guaranteed only to those who are authorized, by means of policies. This scenario is commonly referred to as policy-based access control. In addition to the use of authentication processes, 2 other features are used, namely profiling and posture. While the first identifies the type of device attempting to access (e.g., PC, printer, IP phone), the second identifies its health status. Through the implementation of these 3 functions, access to the network can be managed and monitored through different levels of granularity and above all with ease. The study of the thesis therefore focuses on the analysis and implementation of NAC in a test environment, to then be replicated also in the production environment.File | Dimensione | Formato | |
---|---|---|---|
Basso_Marco.pdf
accesso aperto
Dimensione
40.36 MB
Formato
Adobe PDF
|
40.36 MB | Adobe PDF | Visualizza/Apri |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/35520