Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Survivor's Guide to 2007: Network Infrastructure: Page 5 of 9

Cutting off an unmanaged host may not be desirable--say it belongs to a vendor assisting with production installation. You can certainly enforce such a policy, but then you'll have to make other network connectivity available. If you do provide limited guest access, you'll have to decide exactly what's allowed--say, access to the Internet only. But then, what about exceptions? Some guests will need access to internal resources.

Before you even begin to deploy NAC, address these issues so that you can assess whether a particular product will fit your needs.

Finally, decide what enforcement models fit your current and future network plans. This is a tough one. While 802.1X port control is one of the best enforcement methods available, it may not be practical because the supporting infrastructure (802.1X supplicants on hosts, authentication servers and access switches that support 802.1X) may not be enterprise-ready. The reality is, 802.1X is often not an option--yet. Alternate enforcement techniques, such as in-line blocking using a bump-in-the-wire appliance, may introduce a point of failure and a potential network bottleneck. Layer 2/3 methods, such as ARP poisoning and DHCP control, are easier to deploy but less effective at combating determined attackers.

To address enforcement, tie your NAC deployment to your network architecture. Port-level access control offers a good balance between fine-grained and broad enforcement; if the enforcement is in your access switch, there's no need for an additional appliance. Consider requiring 802.1X in all access switches going forward. You don't need 802.1X in the distribution layer or core of the network; you can replace as you go. If you're deploying a NAC product now, ensure that it supports all enforcement methods you need today and in the future by offering concurrent enforcement options.

Consolidation Is King