2. Technical operation
Depending on the NAC solution, the components of the solution and the means of control differ greatly. Here, we describe in detail how the most common control processes work.
2.1 Functions in the control process
The control process involves three players:
the customer. This is the entity requesting access to the network;
the control point. It is responsible for applying the control strategy defined...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Technical operation
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!