NAC – Cisco Network Admission Control

Abbreviated as NAC, Cisco’s Network Admission Control is a set of technologies and solutions that use the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources in order to limit damage from emerging security threats. NAC is designed to allow network access only to compliant and trusted endpoint devices (PCs, servers and PDAs, for example) and can restrict the access of noncompliant devices. NAC assesses all endpoints across all access methods, including LAN, wireless connectivity, remote access and WAN. [Source: Cisco Systems]

In October 2006, Cisco and Microsoft formally announced interoperability between the Cisco Network Admission Control (NAC) and Microsoft Network Access Protection (NAP) solutions. Interoperability will be supported with the release of NAP in the future version of Windows Server which is scheduled to be available in the second half of 2007. The interoperability architecture allows customers to deploy both NAC and NAP incrementally or concurrently.

See also Microsoft Network Access Protection (NAP).

Also see Webopedia’s “Did You Know… All About Network Access Controls“.

Vangie Beal
Vangie Beal
Vangie Beal is a freelance business and technology writer covering Internet technologies and online business since the late '90s.

Top Articles

List of Windows Operating System Versions & History [In Order]

The Windows operating system (Windows OS) refers to a family of operating systems developed by Microsoft Corporation. We look at the history of Windows...

How to Create a Website Shortcut on Your Desktop

Website Shortcut on Your Desktop reviewed by Web Webster   This Webopedia guide will show you how to create a website shortcut on your desktop using...

What are the Five Generations of Computers? (1st to 5th)

Reviewed by Web Webster Each generation of computer has brought significant advances in speed and power to computing tasks. Learn about each of the...

Hotmail [Outlook] Email Accounts

Launched in 1996, Hotmail was one of the first public webmail services that could be accessed from any web browser. At its peak in...

SHA-256

SHA-256 is an algorithm used for hash functions and is a vital component...

Document Management System

A document management system is an automated software solution businesses and organizations use...

Conti Ransomware

Conti ransomware first emerged in 2020. It uses a ransomware as a service...