Cisco Cisco NAC Appliance 4.1.3 Leaflet
12
© 2006 Cisco Systems, Inc. All rights reserved.
Cisco Public
Session Number
Presentation_ID
Presentation_ID
C97-348014-00 05/06
NAC Appliance Enforces Compliance
Who’s on?
What’s on?
What are the
requirements
for access?
What are the
steps to meet
requirements?
How do I create
or modify
requirements?
Securely
Identify
Device and User
Authenticates and
authorizes users
(local db, RADIUS,
LDAP, Kerberos, AD,
etc.)
authorizes users
(local db, RADIUS,
LDAP, Kerberos, AD,
etc.)
Supports all access
methods (LAN,
wireless,
remote/VPN, WAN)
methods (LAN,
wireless,
remote/VPN, WAN)
Enforce
Consistent
Policies
Centralized policy
supports multiple
user roles
supports multiple
user roles
Scans for infections,
port vulnerabilities,
hotfixes, AV, AS,
services running,
and files
port vulnerabilities,
hotfixes, AV, AS,
services running,
and files
Quarantine
and
Remediate
Isolates non-
compliant devices
using MAC and IP
addresses; effective
at a
compliant devices
using MAC and IP
addresses; effective
at a
per-user
level
Network-based, self-
guided remediation
guided remediation
Helpdesk integration
Configure
and
Manage
Pre-configured
checks simplify
policy configuration
and rule creation
checks simplify
policy configuration
and rule creation
Web-based interface
for easy
management of
roles, policies, and
remediation steps
for easy
management of
roles, policies, and
remediation steps