. Compliant PC’s act like “Neighborhood Watch”
. The existing normal PC’s become the infrastructure (enforcers) to quarantine rogues
. Enforcers manage ARP to control and limit a Rogue ability to send/receive traffic on the network
. Enforcers watch for new endpoints, using ARP redirection to protect the network and community
DNAC Strengths
. Zero network upgrades or changes (Low TCO)
. Scales cost effectively across multiple subnets
. Authentication agnostic (Windows Domain, 802.1x, other)
. Friendly fail-open design
. Extremely responsive quarantine and remediation mechanisms
Traditional Infrastructure based | Software based | |||
In-line NAC | Cisco NAC V1 V2 802.1x NAC | Host based NAC (CAF) | Dynamic NAC | |
Enforcement Type | Appliance in line | Switch based | Client Self enforcement | Other compliant PC’s |
Supports LAN Enforcement | Yes – but requires multiple appliances | YES | YES | YES |
Supports Remote Access VPN’s | YES | NO | YES | NO |
Network needs Re-architecting | YES | Extensive | None | None |
Detects Rogue Users \ Devices | NO | YES | NO | YES |
DNAC | DNAC + 802.1x authentication | Infrastructure NAC | |
Client Software | DNAC Client | DNAC Client + Supplicant | NAC client + |
Server Software | Policy server | RADIUS server + policy server | RADIUS server + |
Minimum switch requirements | - | 802.1x authentication | 802.1x authentication |
Ongoing port config | - | Config 802.1x ports | Config 802.1x ports |
Ongoing switch config | - | - | New VLAN and subnet, router ACL, DHCP, RADIUS |
One time network Reconfiguration | - | - | New VLANs and subnets, router ACL, DHCP, RADIUS, RADIUS VLAN assignment |
No comments:
Post a Comment