3.3. Summary

Following are key points from this chapter:

  • LAN-based NAC is designed to protect the corporate LAN.

  • Mobile NAC is designed to protect mobile devices, as they are mobile.

  • Devices that put enterprises at risk include the following:

    • Enterprise-owned sedentary desktops that almost never disconnect from the LAN

    • Enterprise-owned laptops that are sometimes on the LAN and sometimes mobile (that is, being used at airports, homes, client sites, and so on)

    • Enterprise-owned laptops that never come back to the corporate LAN

    • Employee-owned home computers that are used by the employee for remote access to corporate resources

    • Unknown devices from contractors, customers, business partners, and so on

    • PDAs and other nontraditional computing devices

  • To provide total coverage, most enterprises would benefit by implementing LAN-based and Mobile NAC solutions.

While this chapter provided the groundwork on what devices would require protection, the Chapters 4 and 5 provide much granular technical detail on why LAN-based and Mobile NAC are necessary. These chapters also show exactly what the risks are by showing actual hacks and exploits.

Get Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.