An organization can set its own policies for each user with NAC, it could result in too much information that sometimes overload it. On the other hand, attackers use malicious devices, they install malicious devices between a legitimate device and the switch, compromising and allowing information leakage.
- Disrupt the NAC infrastructure to make it inaccessible.
- Circumvent the NAC solution by using a man-in-the-middle attack.
- Implement NAC can drastically improve an organizations network security posture.
- A clean NAC solution can greatly increase the difficulty of a successful attack.
- MAC-based NAC should not be used due to it is easy for a hacker to spoof a MAC address.
- Ensure that no devices with access to the internal client network are used in publicly accessible areas.
Anonymous attacker from the Internet performing man-in-the-middle attack.
⌚ 60 minutes.
Default score using CVSS 3.1. It may change depending on the context of the src.
Default score using CVSS 4.0. It may change depending on the context of the src.
The NAC policy is correctly configured
config user nac-policy
Description: Configure NAC policy
edit
set description {description}
set category [device]
set status [enable]
set host {string}
set user {string}
next
end
The NAC policy is based on MAC
config user nac-policy
Description: Configure NAC policy
edit
set description {description}
set category [device]
set status [enable]
set mac {mac-address}
set switch-mac-policy {switchPolicy}
next
end