How can we tell whether the new 802.11n WAPs that we purchase today will be compatible with NAC?
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Today, there are several well-known Network Access Control (NAC) architectures, including Cisco NAC, Microsoft NAP, and Trusted Computing Group TNC. These architectures embed NAC capabilities into the network itself, using devices like Ethernet switches and Wireless APs to handle access requests and enforce access decisions. In addition, there are dozens of products that spin their own flavor of NAC, from proprietary network appliances to endpoint security agents.
This degree of diversity makes it hard to say whether or not any product is compatible with NAC -- a better question to ask is whether a given product is compatible with a specific NAC architecture or appliance. For example, Cisco NAC can protect networks composed of Cisco devices. Today, CNAC-compatible devices include Cisco routers, Catalyst switches, Aironet Access Points, and the Cisco VPN 3000 Concentrator. See Cisco's website for a list of CNAC-enabled products.
Nonetheless, some commonality does extend across all of these NAC architectures, and many proprietary NAC appliances. In particular, most can use 802.1X to handle Layer 2 access requests, relaying those requests over standard RADIUS to NAC policy server where decisions are made. 802.1X is designed to support an open-ended dialog between an 802.1X supplicant (the host requesting access) and an 802.1X authentication server (the system responsible for permitting or denying access). The messages exchanged during that dialog are represented using the Extensible Authentication Protocol (EAP). Today, NAC architectures use different EAP types and endpoint assessment messages carried within those EAP bindings. However, all of those EAPs ride on standard 802.1X.
The bottom line is this: If you plan to implement NAC, purchase Wireless APs (and Ethernet switches) that support standard 802.1X/RADIUS-based port access control. When examining Wi-Fi Alliance test certifications look for WPA-Enterprise and WPA2-Enterprise support. This is all your WAP will need to support basic go/no-go NAC decisions. If you plan to take NAC further, look for the following features:
802.1Q VLAN support letting the WAP tag wireless traffic before it heads into your wired network.
RFC 3580 support letting the WAP understand and apply VLAN IDs returned by the NAC policy server in RADIUS Access Responses.
Virtual APs with the ability to simultaneously support multiple SSIDs, letting the same WAP support both open guest access and secure access.
Intra-WLAN security options that let the WLAN prevent unknown, potentially infected or malicious users from interacting with NAC-authorized users.
These features won't guarantee plug-and-play compatibility between your WAP and all NAC products, but it will give you a pretty good shot at integrating that WAP into many possible NAC deployments.
Related Q&A from Lisa Phifer
The enterprise mobility management market for wearable devices is in its infancy, but IT can still use existing EMM tools to manage wearables.continue reading
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.continue reading
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.