0% found this document useful (0 votes)
43 views1 page

(PDF) Network Access Control Technology-Proposition To Contain New Security Challenges

Uploaded by

kwame Ayew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views1 page

(PDF) Network Access Control Technology-Proposition To Contain New Security Challenges

Uploaded by

kwame Ayew
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Download full-text PDF Join for free Login

Article PDF Available

Network Access Control Technology—


Proposition to Contain New Security
Challenges
January 2012 · International Journal of Communications,
Network and System Sciences 05(08):505-512
DOI:10.4236/ijcns.2012.58061
License · CC BY 4.0

Authors:

Abdelmajid Lakbabi

Citations (5) References (2) Figures (6)

Figures

+1

Figures - available via license: Creative Commons


Attribution 4.0 International
Content may be subject to copyright.

Discover the world's research


20+ million members
135+ million publications
700k+ research projects

Join for free

Public Full-text 1

Available via license: CC BY 4.0


Content may be subject to copyright.

Int. J. Communications, Network and System Sciences, 2012, 5, 505-512


http://dx.doi.org/10.4236/ijcns.2012.58061 Published Online August 2012 (http://www.SciRP.org/journal/ijcns)

Network Access Control Technology—Proposition to


Contain New Security Challenges
Abdelmajid Lakbabi, Ghizlane Orhanou, Said El Hajji
Laboratoire Mathématiques, Informatique et Applications, Faculté des Sciences,
Université Mohammed V-Agdal, Rabat, Morocco
Email: [email protected], [email protected], [email protected]

Received June 11, 2012; revised July 31, 2012; accepted August 12, 2012

ABSTRACT
Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity,
diversity and performance; In order to proactively block such threats we need more integrated information security so-
lution. To achieve this objective, we will analyze a real-world security platform, and focus on some key components
Like, NAC, Firewall, and IPS/IDS then study their interaction in the perspective to propose a new security posture that
coordinate and share security information between different network security components, using a central policy server
that will be the NAC server or the PDP (the Policy Decision Point), playing an orchestration role as a central point of
control. Finally we will conclude with potential research paths that will impact NAC technology evolution.

Keywords: Threats; NAC; Identity; Security Posture; Policy Enforcement Point; Remediation; Coordination;
Orchestration.

1. Introduction sically of two types of assessment:


 User authentication.
Today’s networks are not closed entities with well-de-
 Device compliance evaluation.
fined security perimeters; mobile users bring their lap-
tops and mobiles devices in and out of the office. Re-
mote-access users connect from homes and public loca-
2.1. Network Access Control (NAC) Architecture
tions. Business outsourcing requires direct partner access Below, Figure 1 presents the NAC solution overview.
into the internal network. Onsite visitors, vendors, and This is the process of dynamically provisioning net-
contractors may need physical access to the internal net- work access for each user and endpoint device. NAC
work to accomplish their work. Even traditional, “in-the- solutions entail authentication (identity), endpoint com-
office” workers are subject to threats coming through pliance, remediation, and policy enforcement functions,
Internet access, e-mail use, instant messaging, and peer- in the process of validating user identity and the security
to-peer (P2P) activities. posture of host devices, before allowing access to the
Traditional security products acting independently, network.
such as intrusion detection and prevention (IDS/IPS)
technology, antivirus measures, and firewalls, are no 2.1.1. Security Products Selection Process
longer adequate—network traffic is too diverse to rely on With the idea to select the best security products and
these measures. According to a recent Cyber security tools to build the targeted network security platform,
survey [1], Insider Attacks Are More damaging; Conse- Gartner [2], with a set of technical and commercial criteria
quences include loss of intellectual property, disclosure for evaluating security products, it can help to approach
of confidential information, violation of privacy laws and the most secure solution for each technology layer.
loss of money. As to NAC solution, Gartner states that Cisco NAC [3]
In the following section, we will study the Network (Network Admission Control) and juniper UAC [4] (Uni-
Access Control technology, its architecture, its compo-
fied Access Control) are the best NAC offer at this mo-
nents and some top NAC products.
ment according to Gartner, as presented below in Figure
2.
2. The Network Access Control technology
In the following subsections, we will compare the two
Network Access control (NAC) mechanism consists ba- top NAC solutions according to Gartner classification,

Copy right © 2 012 S ciRes. IJCNS

506 A. LAKBABI ET AL.

Figure 1. NAC solution overview.

Figure 2. Gartner NAC products classification.

discuss their respective weaknesses, and then study how flow as described below in Figure 3
NAC can play a fundamental role, to improve network Cisco NAC access decision is based on:
security by extending its capabilities to administer net- Users, their devices, and their roles in the network
work access requests based on NAC capabilities, and Evaluate whether machines are compliant with secu-
integrating legacy security products, and existing net- rity policies
work infrastructure. Enforce security policies by blocking, isolating, and
repairing noncompliant machines
2.1.2. Technical Description of Cisco and Juniper Provide easy and secure guest access
NAC
Audit and report whom is on the network
2.1.2.1. Cisco Network Access Admission Overview Enforcement Points (where the access decision is ap-
Cisco NAC mechanism is based on the following process plied)

Copy right © 2012 SciRes . IJCNS

A. LAKBABI ET AL. 507

Figure 3. Cisco NAC process flow.

 Cisco Switches. other port configuration parameter.


 Cisco Routers with NAC modules. Juniper UAC introduces Coordinated Threat Control
 Cisco VPN concentrators. with the ability to leverage Juniper’s Intrusion Detection
Cisco NAC Weaknesses. & Prevention (IDP) and Unified Threat Management
 Cisco is ignoring TNC [5] the Trusted Computing’s (UTM) products to deliver dynamic network protection,
proposed standard. and dynamic User Quarantines as well.
 It is a closed solution that may introduce interopera- Juniper’s UAC enables to leverage the deep packet,
bility issues with third party software and networking application level threat intelligence of Juniper Networks
equipments. standalone Intrusion Detection and Prevention (IDP)
 The OOB (out-of-band) [6] deployment model, re- platforms as part of its framework. When a standalone
quires support for communication between the switch Juniper IDP detects a network threat of a particular
and the Cisco CAM (the Manager need to send and type—policies can be configured on several attributes
receive SNMP messages to/from Switchs). This is including attack category, attack protocol, attack strings,
supported only on selected Cisco products. actions taken, destination or source addresses/ports—it
 Bring security enforcement deeper into the core of the can signal the Infranet Controller, which after receiving
network, but with limited integration with others the signal and information from the IDP can narrow the
Cisco network systems, and with no integration with threat to a specific user or device; UAC can then imple-
different security products than Cisco. ment a configurable policy action, including the follow-
ing flexible options:
2.1.2.2. Juniper UAC Overview  Quarantining the user (or device) by placing them in a
Juniper NAC mechanism is based on the following proc- restricted VLAN;
ess flow as detailed below in Figure 4  Changing roles and denying access to certain applica-
Juniper dynamic access control is based on: tions;
User identity  Terminating the user session; or even disabling the
Device security state user session until an administrator can re-enable it.
Location Juniper NAC Weaknesses
Enforcement Points  Juniper’s license is restrictive. If a user logs in at two
 Policy enforcement provided by EX-series switches different connections, that will count as two seats in-
and SSG/ISG Firewalls. stead of one.
 IC can push policy name to EX-series switches for  Juniper supports only limited use cases. It does not
dynamic configuration based on user or device. support routers as an enforcement device.
 Policy on EX-series can enforce specific QoS queu-  It needs an inline firewall for wireless coverage. Ju-
ing or scheduling policies, VLAN assignment, or any niper’s non-802.1x implementation is supported only

Copy right © 2012 SciRes . IJCNS

Citations (5) References (2)

Analysis of Current Preventive Approaches in the


Context of Cybersecurity
Conference Paper
Sep 2022
Mimi Enakome Oka · Martin Hromada

View

A Comparative Study of Network Access Control and


Software-Defined Perimeter
Conference Paper Full-text available
Sep 2020
Rami Omar · Tawfig Abdelaziz

View

A Log Management System of Removable Storage


Devices Based on Blockchain
Article
Jul 2020
Jun-Hyung Ko · Gyu-Seong Lee · Heeyoul Kim · Namgi
Kim

View

Value Roadmap Development for Telecommunication


Industry
Chapter
Oct 2019
Tuğrul U. Daim · Zahra Faili

View Show abstract

Network Access Control and Collaborative Security


Against APT and AET
Chapter
May 2018
Ghizlane Orhanou · Abdelmajid Lakbabi · Nabil
Moukafih · Said El Hajji

View Show abstract

Recommended publications Discover more

Article Full-text available

Cloud Multidomain Access Control Model Based on


Role and Trust-Degree
April 2016 · Journal of Electrical and Computer Engineering

Lixia Xie · Chong Wang

In order to solve the problem of access control among


different security domains in cloud networks, this paper
presents an access control model based on role and trust-
degree. The model combines role-based access control and
trust-based access control. The role assessment weights are
defined based on the user’s role classes, and the trust-degree
is calculated according to the role assessment ... [Show full
abstract]

View full-text

Article

Establishment of improved business security systems


December 2010

W. Cha · D. Won

Many of recent security systems are used in linkage with


previously defined security systems. In particular, access
control functions are used in all security systems. Network
access control systems have now become the basics of
security systems. In this paper, an improved business security
system using network access control will be proposed. The
improved security system will be established to ... [Show full
abstract]

Read more

Article

Access Control List Provides Security in Network


July 2015 · International Journal of Computer Applications

Chate A.B. · Vanajaroselin Chirchi

Read more

Article

Node-to-Set Disjoint-Paths Routing in Recursive


Dual-Net
January 2011 · International Journal of Networking and
Computing

Yamin Li · Shietung Peng · Wanming Chu

Recursive dual-net (RDN) is a newly proposed interconnection


network for massive parallel computers. The RDN is based on
recursive dual-construction of a symmetric base-network B. A
k-level dual-construction for k > 0 creates a network RDNk(B)
containing N = (2n0)2k/2 nodes with node-degree d0 + k,
where n0 and d0 are the number of nodes and the node-
degree of the base network, respectively. The ... [Show full
abstract]

Read more

Company

About us

News

Careers

Support

Help Center

Business solutions

Advertising

Recruiting

Advertisement
© 2008-2023 ResearchGate GmbH. All rights reserved.

Terms · Privacy · Copyright · Imprint


Searching for qualified biologists?

You might also like