Leaflet
12
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
Session Number
Presentation_ID
C97-348014-00 05/06
NAC Appliance Enforces Compliance
Who’s on?
What’s on?
What are the
requirements
for access?
What are the
steps to meet
requirements?
How do I create
or modify
requirements?
Securely
Identify
Device and User
Authenticates and
authorizes users
(local db, RADIUS,
LDAP, Kerberos, AD,
etc.)
Supports all access
methods (LAN,
wireless,
remote/VPN, WAN)
Enforce
Consistent
Policies
Centralized policy
supports multiple
user roles
Scans for infections,
port vulnerabilities,
hotfixes, AV, AS,
services running,
and files
Quarantine
and
Remediate
Isolates non-
compliant devices
using MAC and IP
addresses; effective
at a per-user level
Network-based, self-
guided remediation
Helpdesk integration
Configure
and
Manage
Pre-configured
checks simplify
policy configuration
and rule creation
Web-based interface
for easy
management of
roles, policies, and
remediation steps