Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

Network mapping for NAC implementation

A comprehensive network inventory is necessary for NAC implementation, and can be full of surprises.

Article comments

One of the first things that needs to be done in NAC implementation is figuring out just exactly what devices are authorised to be on the network and how they should be authenticated.

Getting a comprehensive network inventory is always full of surprises. Network executives report they find devices like hubs that they’d long ago forgotten about, but are still in use. Many offices have small, unauthorised switches attached to Ethernet drops. And many employees use the extra port in their cubicle for an unauthorised wireless access point.

Performing such an inventory by hand is daunting. It takes a team of at least two - one in the wiring closet, one in the office space - tracking down what device is plugged into what port.

This inventory is important because not all devices can be authenticated in the same way.

For instance, a network could demand 802.1x authentication from a properly equipped PC. That would not be possible with a printer or a VoIP phone that lacks 802.1x support, but they both have just as much right to be on the network as the PC.

There are tools that can help with this network mapping. One such tool is Great Bay Software’s Beacon Endpoint Profiler, which also has other benefits. These appliances map networks and categorise each machine that is attached, and they can assign 802.1x policies to non-802.1x devices. So if all the printers on a network can be assigned a policy that allows access only via certain TCP ports, the Beacon device can distribute that policy so 802.1x switches apply it to all printers on the network, for example.

Check with your NAC vendor to find out whether it has its own or a partner’s technology that can meet this need.


More from Techworld

More relevant IT news


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map

* *