Network Access Control (NAC)
• Makes extensive use of EAP and RADIUS
• Extensible Authentication Protocol / Remote
Authentication Dial In User Service
• Duplicate MAC address checking - Stop the spoofers
Port security
• Prevent unauthorized users from connecting
to a switch interface
• Alert or disable the port
Port security operation
• Configure a maximum number of source MAC
addresses on an interface
• You decide how many is too many
• You can also configure specific MAC addresses
• The switch monitors the number of unique MAC
addresses
• Maintains a list of every source MAC address
• Once you exceed the maximum, port security
activates
• Default is to disable the interface
MAC filtering
• Media Access Control - The “hardware” address
• Easy to find working MAC addresses through wireless
LAN analysis
• MAC addresses can be spoofed
• Free open-source software
• Security through obscurity
Captive portal
• Once proper authentication is provided, the web
session continues
• Until the captive portal removes your access
Access Control Lists (ACLs)
• ACLs evaluate on certain criteria
• Source IP, Destination IP, TCP port numbers, UDP
port numbers, ICMP