You don't have access to this class

Keep learning! Join and start boosting your career

Aprovecha el precio especial y haz tu profesión a prueba de IA

Antes: $249

Currency
$209
Suscríbete

Termina en:

2 Días
14 Hrs
16 Min
30 Seg
Curso de Seguridad de Redes On-Premise

Curso de Seguridad de Redes On-Premise

Donny Alexander Rodríguez Cáceres

Donny Alexander Rodríguez Cáceres

Control de acceso a red - NAC

11/12
Resources

What is NAC access control and why is it important?

Managing our networks and securing our data is critical in today's IT environment. However, one crucial piece that is often overlooked is Network Access Control (NAC). But why is it so important? NAC acts as a technology gatekeeper, assessing whether a machine or equipment has the right to access a network based on various admission requirements. From inspecting a machine's security status to validating its patch levels and antivirus versions, NAC ensures that only eligible devices can enter the network.

How does NAC improve the security of our network?

NAC access control not only determines whether a device can enter the network, but also constantly monitors the behavior of that device. In case of suspicious behavior, NAC can automatically disconnect the device, thus providing an additional layer of security. It is worth remembering that managing our network involves managing multiple services and protocols such as Radius, ACLs (Access Control Lists), VLANs, and much more, and here NAC becomes a great ally by centralizing this management.

What NAC services are available?

  • Commercial options: Paid solutions such as Cisco Identify and Jane.
  • Open source options: Open source solutions such as Packet Fence.

How does NAC work in the management of guest devices?

Let's suppose that we need to manage the devices of a provider that will work in our network. Normally, we would have to make multiple adjustments to our infrastructure. However, with NAC, the process is simplified into defined steps:

  1. Identify: Verify which network the device is connected to and identify it as external equipment that does not yet have access to resources.
  2. Classify: Determine characteristics such as the operating system, roles it will play and networks to be connected.
  3. Control: Apply measures such as notifications to administrators or port blocking if access is not allowed.

This control is done through access policies and secure protocols, without the need to install additional software on the devices.

What considerations should we take into account when implementing NAC?

As our networks grow, administration becomes more complicated. NAC offers a centralized solution to this challenge, but requires proper initial configuration and effective ongoing management. This can be challenging, but the benefits in security and operational efficiency justify the effort. We invite those who have already implemented this technology to share their experiences and reflections.

NAC represents a powerful tool for any organization seeking effective and secure access control. We encourage you to learn more about this technology and consider implementing it to strengthen the management of your infrastructure. Knowledge is power and the right implementation can make all the difference!

Contributions 5

Questions 1

Sort by:

Want to see more contributions, questions and answers from the community?

El acrónimo correcto es TACACS. Ojo: Team Platzi.
# **Control de acceso a red - NAC** Herramienta que permite determina si un sistema o un equipo tiene permitido el acceso a la red si pasa unos requisitos de admisión, NAC puede determinar el estado de seguridad de una maquina, validar niveles de parchado, versiones de antivirus y otro tipo de detalles antes de admitir un dispositivo en la red. Los sistemas NAC también pueden remover un dispositivo de la red en caso de tener un comportamiento sospechoso. * Radius/TACACS * ACL * Terminales y comandos * Roles * VLAN * Protocolos de sesión Existen múltiples proveedores para este tipo de servicio como: * Cisco Identity Services Engine (Pago) * PacketFence (OpenSource) NAC trabaja en tres etapas: 1. identificar 2. Clasificar 3. Controlar
No tenia comienzo de ACL, investigare mas sobre la gran administración que se implementa en redes 👩‍💻💪
Tener en cuenta que con NAC en la etapa de control es donde es posible realizar acciones como bloqueo de puertos por conexion de equipos no autorizados
**Con el Control de acceso a red - NAC se establecen los siguientes pasos:** 1. **Identificar:** ¿A qué red se conectó el dispositivo? 2. **Clasificar:** Sistema operativo, tipo de roles que desempeñará, etc. 3. **Controlar:** Desde notificar a administradores y bloquear puertos cuando el acceso no está permitido. 4. **Clasificar.**