Network Access Control for Dummies

  • 5h 19m
  • Denzil Wessels, Jay Kelley, Rich Campagna
  • John Wiley & Sons (US)
  • 2009

Network access control (NAC) is how you manage network security when your employees, partners, and guests need to access your network using laptops and mobile devices. Network Access Control For Dummies is where you learn how NAC works, how to implement a program, and how to take real-world challenges in stride.

You’ll learn how to deploy and maintain NAC in your environment, identify and apply NAC standards, and extend NAC for greater network security. Along the way you’ll become familiar with what NAC is (and what it isn’t) as well as the key business drivers for deploying NAC.

  • Learn the steps of assessing, evaluating, remediating, enforcing, and monitoring your program
  • Understand the essential functions of Authentication, Authorization, and Accounting
  • Decide on the best NAC approach for your organization and which NAC policies are appropriate
  • Discover how to set policies that are enforceable and reasonable enough to be followed, yet still effective
  • Become familiar with the architectures and standards essential to NAC
  • Involve and motivate everyone in the organization whose support is critical to a successful implementation

Network Access Control For Dummies shows you the steps for planning your implementation, who should be involved, where enforcement should occur, and much more. When you flip the switch, you’ll know what to expect.

About the Authors

Jay Kelley: A Product Marketing Manager at Juniper Networks, Jay Kelley is responsible for driving the messaging and promotion of Juniper's Network Access Control solutions, including Juniper Networks Unified Access Control (UAC), Odyssey Access Client (OAC), and Steel-Belted Radius (SBR). Prior to serving in his current role, Kelley managed the Product Management and Marketing for Endpoint Assurance, a Network Access Control solution from Funk Software, Inc. until the company's acquisition by Juniper in 2005. With more than twenty years of technology marketing experience, Kelley has worked with and for a number of established companies and start-ups. He actively participates in a number of industry groups and consortiums including the Trusted Computing Group (TCG)'s Trusted Network Connect (TNC) workgroup. Kelley holds a Bachelor of Science degree in Business Management from Daniel Webster College.

Rich Campagna: A Senior Product Line Manager at Juniper Networks, Rich Campagna is responsible for defining product requirements and strategy for both the Juniper Networks Secure Access SSL/VPN product family as well as Juniper's NAC product line, Unified Access Control (UAC). Rich's expertise spans the breadth of NAC and remote access control technologies. Prior to joining Juniper Networks, Campagna was a Sales Engineer at Sprint Corporation. Rich has an MBA from the UCLA Anderson School of Management, and a B.S. in Electrical Engineering from Pennsylvania State University.

Denzil Wessels: A Senior Technical Marketing Manager at Juniper Networks, Denzil Wessels is responsible for access control technologies. This includes helping customers architect Network Access Control deployments, evaluating competitive technologies to provide Juniper's sales and marketing teams with the right sales tools and knowledge. In addition to extensive customer interaction at the evaluation and deployment levels, Denzil manages key business development partners, working with partners on interoperability tests or integration to develop leading, joint security solutions from Juniper and its partners. Prior to joining Juniper Networks, Denzil was a Systems Engineer at F5 Networks, responsible for architecture design and implementing customer solutions. He has also been a consultant for Infinisys, designing and implementing comprehensive customer networking solutions.

In this Book

  • Introduction
  • Developing a Knack for NAC
  • Knowing Why You Want NAC
  • The NAC Lifecycle
  • NAC Components
  • SSL VPNs
  • Writing a Corporate Security Policy
  • Herding the Cattle
  • Identifying Who's on My Network
  • Verifying That a PC is Safe
  • Deciding Where to Enforce
  • Flipping the Switch
  • NAC Architectures
  • The Role of Standards
  • Extending NAC
  • Ten Best Practices
  • Ten Steps to Planning Your NAC Implementation
  • Ten Online Information Sources
  • Ten Definitions