12.07.2015 Views

Bypassing NAC v2.0 - OSSIR

Bypassing NAC v2.0 - OSSIR

Bypassing NAC v2.0 - OSSIR

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

In-Line DevicesWeaknesses• No knowledge on actual network topology may lead existence ofother, uncovered venues to access the network– Where to install the in-line devices• Deployment must involve a network re-architecture• Deployment must be as close as possible to the access layer tobe efficient and productive• A possible point of failure• Deployment is time consuming (the networking people in ITwould fiercely resist it)• The infection/compromise of other elements on the local subnetand/or switch is possible• Some elements may only generate Layer 2 traffic• Cost

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!