Skip to content

TechRepublic

  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • TechRepublic Premium
  • Top Products
  • AI
  • Developer
  • Payroll
  • Security
  • Project Management
  • TechRepublic Academy
  • Innovation
  • Cheat Sheets
  • Big Data
  • Tech Jobs
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Security

Recommended network access control (NAC) tools

By Jack Wallen February 4, 2011, 3:28 AM PST

Image
1
of 9

Recommended network access control (NAC) tools

PacketFence configuration

PacketFence configuration

ntAnother screenshot from the PacketFence NAC tool. This is one of the most important tabs in the interface as here you actually configure the various services and systems for PacketFence. Shown is the Trapping configuration. As you can see, I have the trapping configuration set up to trap all IP addresses on my 192.168.1.0 network. All network addresses on that scheme will be fed through this gateway and are required to register with PacketFence before they can access the external network.

Recommended network access control (NAC) tools

PacketFence device discovery

PacketFence device discovery

ntIn this screenshot, you see the node listing which includes all devices found on my internal network. From this listing you can edit the information of each device which includes the ability to register a device. If a device is not registered, and you have registration enabled, that device will not be able to access the external network.

Recommended network access control (NAC) tools

Cisco NAC login page

Cisco NAC login page

ntA much more familiar piece of software/equipment to the larger enterprise users will be the Cisco NAC Appliance. Here you see one of the screens for the process of creating a Login page so that users can register their machines. In this screen we are creating a hotspot for users for IP address 192.168.1.12. For the Cisco NAC login page you actually need to create the html page and then copy that page (as shown in this image) to /guest/www/html/sites/hotspot. That directory, of course, can change depending upon how you have your web server set up.

Recommended network access control (NAC) tools

Cisco NAC Access Plan

Cisco NAC Access Plan

ntAnother shot of the Cisco NAC. Here we set up the Access Plan for the hotspot we are creating.  For this configuration you need to give it a name, configuration, select a time profile from the dropdown, Guest Role from the dropdown, and set a price (if applicable). Of course if there is no price associated with the plan set this at 0. The Cisco NAC is one of the more complex network access control tools you will find. It is also one of the most powerful available.

Recommended network access control (NAC) tools

Dans Guardian configuration file

Dans Guardian configuration file

ntIf you’re looking for a very easy-to-install and configure proxy server, look no further than Dans Guardian. This FOSS software, available for many Linux distributions as well as various BSDs, Mac OSX, HP-UX, and Solaris, is one of the easiest proxy servers you will ever find. It is all hand-coded and runs very silently in the background. Once installed, you simply add the sites you want to ban and point your desktop machines to the IP address of the server hosting Dans Guardian. The configuration file (shown here) is /etc/dansguardian/dansguardian.conf.

Recommended network access control (NAC) tools

Dans Guardian bannedsitelist

Dans Guardian bannedsitelist

ntHere you see the bannedsitelist configuration file that is used to block specific sites with your proxy. This file is found in /etc/dansguardian/lists/ and can be edited using any text editor. In this screen I have it showing where you enter the specific domains you want to block. By default, the domain badboys.com is blocked. Remember, if you make changes to this file, restart dansguardian with a command similar to sudo /etc/rc.d/dansguardian restart.

Recommended network access control (NAC) tools

Gnome Nanny

Gnome Nanny

ntThe GNOME Nanny application is a very user-friendly, reliable way to control access to various web-based tools on a desktop machine. This tool is set up using the admin user rights and then put into place such that only users with the admin password can change any of the settings. With this tool you can block specific web sites and control what time of day (or how long) each of the configurable applications can be used (Web, Email, Instant Messaging). You can even control when and how long someone can use the computer.

Recommended network access control (NAC) tools

OpenDNS

OpenDNS

ntI have seen a significant uptick in clients, organizations, and businesses taking advantage of the amazing amount of controls offered to them thanks to OpenDNS. With one of the best filtering systems available, OpenDNS allows you to very specifically control what your employees can visit during work hours (or all hours or specific hours). Of course to get the best out of OpenDNS you will need to pay for either the OpenDNS Deluxe package or the OpenDNS Enterprise package. Visit the Start Page to see the difference in the packages.

Recommended network access control (NAC) tools

WebContentControl GUI : Dans Guardian, Tiny Proxy, FireHol

WebContentControl GUI : Dans Guardian, Tiny Proxy, FireHol

ntThe WebContentControl GUI is a graphical frontend for controlling the proxy power-trio Dans Guardian, TinyProxy, and FireHol. With this tool you can get very granular with the configuration of the various tools. You can set up blacklists, whitelists, configure presets, start/stop daemons, read logs, block websites, add permissions for specific programs, and much more. You can also set this up on a per-user basis, so each user has different settings. If you need more power than what only one of these proxy servers gives you, nothing will make you feel like a Modern Day Warrior more than this power trio front end.

  • Security
  • Account Information

    Share with Your Friends

    Recommended network access control (NAC) tools

    Your email has been sent

Share: Recommended network access control (NAC) tools
Image of Jack Wallen
By Jack Wallen
Jack Wallen is an award-winning writer for TechRepublic, The New Stack, and Linux New Media. He's covered a variety of topics for over twenty years and is an avid promoter of open source. For more news about Jack Wallen, visit his website jackwallen.
  • Account Information

    Contact Jack Wallen

    Your message has been sent

  • |
  • See all of Jack's content

Daily Tech Insider

If you can only read one tech story a day, this is it.

Cybersecurity Insider

Stay abreast of the latest cybersecurity news, solutions, and best practices

TechRepublic Premium

  • TechRepublic Premium

    New Employee Checklist and Default Access Policy

    Onboarding new employees and providing them with the equipment and access they need can be a complex process involving various departments. This New Employee Checklist and Default Access Policy from TechRepublic Premium enables the IT and HR departments to effectively partner and ensure new hires receive a standard set of equipment and features. From the ...

    Published:  December 3, 2023, 4:00 PM EST Modified:  December 4, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Hiring Kit: Video Game Animator

    Recruiting a video game animator with the right combination of experience and technical expertise will require a comprehensive screening process. This hiring kit from TechRepublic Premium provides an adjustable framework your business can use to find the right person for the job. From the hiring kit: DETERMINING FACTORS, DESIRABLE PERSONALITY TRAITS AND SKILLSETS Beyond sheer ...

    Published:  December 3, 2023, 4:00 PM EST Modified:  December 4, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Payroll Processing Checklist

    Some operations and tasks don’t require painstaking attention to detail. Unfortunately, processing payroll isn’t one of them. With sensitive salary and wage information, bank and direct deposit accounts, Social Security numbers and other personal information in play, the stakes are high. This guide — and the accompanying spreadsheet — from TechRepublic Premium will help you ...

    Published:  November 30, 2023, 4:00 PM EST Modified:  December 1, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles
  • TechRepublic Premium

    Quality Assurance Checklist For Outsourced Projects

    Quality assurance refers to the processes being used to manage the project and to build the deliverables. This is in contrast to quality control, which refers to the activities used to create the deliverables. Because you are not responsible for the creation of the deliverables (quality control), you need to be comfortable that the outsourcer ...

    Published:  November 29, 2023, 4:00 PM EST Modified:  November 30, 2023, 9:00 AM EST Read More See more TechRepublic Premium articles

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information
  • Careers

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • Editorial Policy
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice
CLOSE

Create a TechRepublic Account

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

Already registered? Sign In
Use Facebook
Use Linkedin

* - indicates required fields

CLOSE

Sign in to TechRepublic

Not a member? Create an account
Use Facebook
Use Linkedin

Lost your password? Request a new password

CLOSE

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Check your email for a password reset link. If you didn't receive an email don't forgot to check your spam folder, otherwise contact support.

Back to login
1 Finish Profile
2 Newsletter Preferences
CLOSE

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

No thanks, continue without
1 Finish Profile
2 Newsletter Preferences
CLOSE

Want to receive more TechRepublic news?

Newsletter Name
Subscribe
Daily Tech Insider
Daily Tech Insider AU
TechRepublic UK
TechRepublic News and Special Offers
TechRepublic News and Special Offers International
Executive Briefing
Innovation Insider
Project Management Insider
Microsoft Weekly
Cloud Insider
Data Insider
Developer Insider
TechRepublic Premium
Apple Weekly
Cybersecurity Insider
Google Weekly
Toggle All
No thanks, continue without

You're All Set

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add newsletters@nl.technologyadvice.com to your contacts list.

Back to Home Page