Abstract

The NAC (Network Access Control) technology which enforces the endpoint access decision based on the collected endpoint security status information and platform measurement information has been developed by various companies and has been widely deployed in intranets. Besides intranet, mobile telecommunication networks also find NAC is required. This paper introduces the main NAC solutions in industry and analyzes the essential of current NAC technologies in the perspective of protocol. And then this paper describes the explicit requirement of remote platform integrity validation which may utilize the NAC in the mobile telecommunication networks and discus a feasible way of implementing the NAC technology into a scenario by using protocol adaption of EAP over IKEv2. Keyword-Network Access Control; Trusted Network Connection; Home Access Point; EAP; IKEv2 I� INTRODUCTION As security is becoming one of the most important problems of current network, it is necessary to protect the network from the endpoint side. A feasible way is that the network side measures the security status of endpoints while they are requesting to access the network. This kind of technology which is called as NAC (Network Access Control) has been widely developed and deployed in intranets. But NAC is not only suitable for intranet. It can be forecasted that it will a fundamental infrastructure of various network in the future. Now some requirements of NAC have emerged in mobile telecommunication networks. This paper introduces current NAC technologies, analyzes the essential problem of NAC in the perspective of protocol, and then discus a feasible way of implementing the NAC technology into a scenario of mobile telecommunication by using protocol adaption of EAP over IKEv2.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call