Securing physical port access to your infrastructure is something that is reasonably straightforward to implement these days, but it wasn't always the case.
Securing physical port access to your infrastructure is something that is reasonably straightforward to implement these days, but it wasn’t always the case.
Since the birth of 802.1x, its integration and implementation into Windows XP (via the wired LAN service) was always a little hit and miss. The service didn’t always start and when it did, it could attempt to authenticate with the wrong credentials. 802.1x or NAC (Network Access Control) has come a long way and is a little more refined. It’s easier to customise the authentication method in the wired or wireless service, hooking in quite nicely to AD (Active Directory) and group policy to push the settings out to your corporate users for a quick and seamless switchover.
However, NAC alone isn’t enough to secure the network. We have to go one step further, by not only authenticating the device (or at least has an authorised person using it) but to also assess that the computer meets corporate standards. These corporate standards could be items such as: Anti-Virus enabled and up-to-date, Windows critical updates installed, Windows firewall enabled etc. This is called posture assessment, and based on the posture result of a check against a device we can perform specific actions. These may be to allow access, change a port VLAN membership such as a quarantine VLAN should the PC require remediation, or to block access entirely.
To give an example, our NAC solution is setup to authenticate all clients, wired or wireless, against AD using Certificate issues by the enterprise CA. At this first step any failed authentications, or clients that do not support 802.1x are placed into the guest VLAN, which only has access through the firewall to the internet. Clients passing this check then have their posture assessed using Windows Health checks. Clients that have not checked in with Windows update in the last 2 weeks are placed in the quarantine VLAN for remediation. Any other clients that do not support Windows health checks (such as my MAC) are placed in a separate client VLAN. You may be wondering, “What about devices such as printers?” Well, we also incorporate a solution for those. The printer’s MAC address is placed on our radius server and the switch attempts a Mac Authentication Bypass for any clients that do not support 802.1x. In this case our printer is authenticated by its Mac address, placed in the correct VLAN. For added measure, for anyone trying to spoof the MAC address, a downloadable ACL (Access Control List) is passed to the switch, allowing the printer to only communicate to client subnets.
To learn more about how your organisation could benefit from using NAC, please contact a member of the Atomos Networks’ technical sales team on 0113 323 7722 or email sales@atomosnetworks.com
PSTN Connectivity
We can connect your telephony platform to a telephony provider using either traditional services such as ISDN/T1, or newer resilient SIP trunks. As with all Atomos work, we begin with a site visit and analysis of what’s available, making recommendations that suit your budget at the same time as highlighting the benefits and limitations of each recommendation.
Video Conferencing
We provide enterprise class Video Conferencing solutions through Cisco's extensive portfolio. We are experts in delivering Cisco Telepresence, Cisco WebEx Meetings and Cisco WebEx Teams and can provide design, installation and configuration for all three of these solutions.
Telephony
We are highly experienced in telephony service provision - with clients ranging from local businesses, to enterprise-grade regional, national and European businesses. All our hosted telephony solutions are feature rich.
Borderless Networks
Workspace, as we know it, has changed dramatically in recent years. We can assist in the design and delivery of your borderless network, working with our partner Cisco. Our aim is to enable various services such as mobility, security and applications with our key vendor technologies, whilst simplifying operations, increasing productivity, and aiding the operational efficiency of your organisation.
