60.9k views
0 votes
You are managing a huge site with large numbers of network ports spread across many floors. You are considering implementing a Network Access Control system but what interim measures could you take to identify rogue machines?

User Leena
by
7.9k points

1 Answer

5 votes

Final answer:

Before implementing a full Network Access Control system, use network audits, MAC address filtering, network monitoring tools, and port security on switches as interim measures to identify rogue machines in a large network environment.

Step-by-step explanation:

When managing a large site with numerous network ports, implementing a Network Access Control (NAC) system can be a comprehensive solution to identify rogue machines. However, before a full NAC system is implemented, there are several interim measures you can consider:

  • Conducting regular network audits to identify unauthorized devices connected to the network.
  • Implementing MAC address filtering to allow only recognized devices to connect to the network.
  • Using network monitoring tools to watch for unusual traffic patterns or devices that may be rogue.
  • Enabling port security on switches to limit the number of devices that can connect to a single port and to disable ports when unauthorized use is detected.

While these measures are not as robust as a full NAC implementation, they can serve as a layer of security to detect and prevent unauthorized access until more advanced measures are put in place.

User Quin
by
8.2k points