A Review of Opensource Network Access Control (NAC) Tools for Enterprise Educational Networks
نویسندگان
چکیده
In enterprise networks, the concept of bringing your own devices (BYOD) to work and also allowing guest nodes to connect to the network is encouraged. As a factor the need to control access to the network is critical as visibility of nodes attached to the network is paramount in determining potential threats. The use of opensource technology is not mostly patronized by the corporate world because of the steep learning curve and the assumed complexities involved in the use of these software. This paper throws more light on the need for the use of opensource for enterprise networks especially for such networks for developing economies. Three major open source tools (OpenNAC, PacketFence and FreeNAC) are reviewed to provide a mechanism for assessing and selecting an opensource option for your educational network.
منابع مشابه
Using Secure Coprocessors to Protect Access to Enterprise Networks
Enterprise firewalls can be easily circumvented, e.g. by attack agents aboard infected mobile computers or telecommuters’ computers, or by attackers exploiting rogue access points or modems. Techniques that prevent connection to enterprise networks of nodes whose configuration does not conform to enterprise policies could greatly reduce such vulnerabilities. Network Admission Control (NAC) and ...
متن کاملThe Role of Regulatory in Price Control and Spectrum Allocation to Competing Wireless Access Networks
With the rapid growth of wireless access networks, various providers offer their services using different technologies such as Wi-Fi, Wimax, 3G, 4G and so on. These networks compete for the scarce wireless spectrum. The spectrum is considered to be a scarce resource moderated by the spectrum allocation regulatory (“regulatory” for short) which is the governance body aiming to maximize the socia...
متن کاملEnterprise Wireless Fidelity Implementations Using Port Based Network Access Control (IEEE 802.1X)
Enterprise Wireless Fidelity implementations have complicated requirements for Authentication, Authorization, Accounting (AAA) and detection of unauthorized access. Recent incidents show that unsecured implementations invite severe risk to enterprise network and data (especially for financial and critical sectors). In this paper a secure implementation is proposed which addresses most of the po...
متن کاملPattern Recognition in Control Chart Using Neural Network based on a New Statistical Feature
Today for the expedition of the identification and timely correction of process deviations, it is necessary to use advanced techniques to minimize the costs of production of defective products. In this way control charts as one of the important tools for the statistical process control in combination with modern tools such as artificial neural networks have been used. The artificial neural netw...
متن کاملA Review of Epidemic Forecasting Using Artificial Neural Networks
Background and aims: Since accurate forecasts help inform decisions for preventive health-careintervention and epidemic control, this goal can only be achieved by making use of appropriatetechniques and methodologies. As much as forecast precision is important, methods and modelselection procedures are critical to forecast precision. This study aimed at providing an overview o...
متن کامل