In a world where more and more services, of any kind, are made easily accessible through the network infrastructures, the management and monitoring of those who try to access these resources is of great importance. Through Network Access Control (NAC) technology, access to the network is guaranteed only to those who are authorized, by means of policies. This scenario is commonly referred to as policy-based access control. In addition to the use of authentication processes, 2 other features are used, namely profiling and posture. While the first identifies the type of device attempting to access (e.g., PC, printer, IP phone), the second identifies its health status. Through the implementation of these 3 functions, access to the network can be managed and monitored through different levels of granularity and above all with ease. The study of the thesis therefore focuses on the analysis and implementation of NAC in a test environment, to then be replicated also in the production environment.

In a world where more and more services, of any kind, are made easily accessible through the network infrastructures, the management and monitoring of those who try to access these resources is of great importance. Through Network Access Control (NAC) technology, access to the network is guaranteed only to those who are authorized, by means of policies. This scenario is commonly referred to as policy-based access control. In addition to the use of authentication processes, 2 other features are used, namely profiling and posture. While the first identifies the type of device attempting to access (e.g., PC, printer, IP phone), the second identifies its health status. Through the implementation of these 3 functions, access to the network can be managed and monitored through different levels of granularity and above all with ease. The study of the thesis therefore focuses on the analysis and implementation of NAC in a test environment, to then be replicated also in the production environment.

Analysis and deployment of a Network Access Control wired solution in an enterprise environment

BASSO, MARCO
2021/2022

Abstract

In a world where more and more services, of any kind, are made easily accessible through the network infrastructures, the management and monitoring of those who try to access these resources is of great importance. Through Network Access Control (NAC) technology, access to the network is guaranteed only to those who are authorized, by means of policies. This scenario is commonly referred to as policy-based access control. In addition to the use of authentication processes, 2 other features are used, namely profiling and posture. While the first identifies the type of device attempting to access (e.g., PC, printer, IP phone), the second identifies its health status. Through the implementation of these 3 functions, access to the network can be managed and monitored through different levels of granularity and above all with ease. The study of the thesis therefore focuses on the analysis and implementation of NAC in a test environment, to then be replicated also in the production environment.
2021
Analysis and deployment of a Network Access Control wired solution in an enterprise environment
In a world where more and more services, of any kind, are made easily accessible through the network infrastructures, the management and monitoring of those who try to access these resources is of great importance. Through Network Access Control (NAC) technology, access to the network is guaranteed only to those who are authorized, by means of policies. This scenario is commonly referred to as policy-based access control. In addition to the use of authentication processes, 2 other features are used, namely profiling and posture. While the first identifies the type of device attempting to access (e.g., PC, printer, IP phone), the second identifies its health status. Through the implementation of these 3 functions, access to the network can be managed and monitored through different levels of granularity and above all with ease. The study of the thesis therefore focuses on the analysis and implementation of NAC in a test environment, to then be replicated also in the production environment.
NAC
security
network access
ise
cisco
File in questo prodotto:
File Dimensione Formato  
Basso_Marco.pdf

accesso aperto

Dimensione 40.36 MB
Formato Adobe PDF
40.36 MB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/35520