Network Access Control is used to determine the level of access users are given to the internal network. Unidentified users get access to the guest network. The authentication system shall be tied to the hardware asset inventory data to ensure only authorised devices can connect to the network.
Authenticated users with managed devices can be allowed on the internal network pending verification by a client program of the device OS security update level and anti-malware status.
Filters are in place against spoofed addresses.
Specification
Utilize port level access control, following IEEE 802.1x standards.
ISO 27001 & 27002:2022
A8.20,
A8.21,
A8.22
SURF toetsingskader informatiebeveiliging (NBA-volwassenheidsmodel)
SM.11 Network security