Cisco Certified Internetwork Expert (CCIE) - Security
1 Network Security Fundamentals
1-1 Introduction to Network Security
1-2 Threat Landscape
1-3 Security Principles and Concepts
1-4 Security Policies and Procedures
1-5 Risk Management
2 Secure Network Design
2-1 Network Architecture and Design
2-2 Secure Network Design Principles
2-3 Network Segmentation
2-4 Secure Network Access
2-5 Secure Network Services
3 Secure Routing and Switching
3-1 Secure Routing Protocols
3-2 Secure Switching
3-3 Secure Network Management
3-4 Secure Network Access Control
3-5 Secure Network Monitoring
4 Secure Wireless Networking
4-1 Wireless Security Fundamentals
4-2 Secure Wireless Network Design
4-3 Wireless Network Access Control
4-4 Wireless Network Monitoring
4-5 Wireless Network Threats and Mitigation
5 Secure Network Services
5-1 Secure DNS
5-2 Secure DHCP
5-3 Secure Network Time Protocol (NTP)
5-4 Secure Network Address Translation (NAT)
5-5 Secure Network Load Balancing
6 Secure Network Access Control
6-1 Network Access Control (NAC) Concepts
6-2 NAC Implementation
6-3 NAC Deployment Models
6-4 NAC Troubleshooting
6-5 NAC Security Best Practices
7 Secure Network Monitoring and Management
7-1 Network Monitoring Tools
7-2 Network Management Protocols
7-3 Network Logging and Analysis
7-4 Network Incident Response
7-5 Network Forensics
8 Secure Network Virtualization
8-1 Network Virtualization Concepts
8-2 Secure Virtual Network Design
8-3 Secure Virtual Network Management
8-4 Virtual Network Threats and Mitigation
8-5 Virtual Network Monitoring
9 Secure Network Automation
9-1 Network Automation Concepts
9-2 Secure Network Automation Tools
9-3 Network Automation Security
9-4 Network Automation Deployment
9-5 Network Automation Monitoring
10 Secure Network Threats and Mitigation
10-1 Network Threats Overview
10-2 Threat Detection and Prevention
10-3 Threat Mitigation Techniques
10-4 Threat Intelligence
10-5 Threat Response and Recovery
11 Secure Network Incident Response
11-1 Incident Response Planning
11-2 Incident Detection and Analysis
11-3 Incident Containment and Eradication
11-4 Incident Recovery
11-5 Incident Reporting and Lessons Learned
12 Secure Network Compliance and Auditing
12-1 Compliance Requirements
12-2 Network Auditing Tools
12-3 Network Compliance Monitoring
12-4 Network Compliance Reporting
12-5 Network Compliance Best Practices
13 Secure Network Infrastructure
13-1 Secure Network Infrastructure Design
13-2 Secure Network Infrastructure Management
13-3 Network Infrastructure Threats and Mitigation
13-4 Network Infrastructure Monitoring
13-5 Network Infrastructure Compliance
14 Secure Network Operations
14-1 Network Operations Concepts
14-2 Secure Network Operations Management
14-3 Network Operations Monitoring
14-4 Network Operations Incident Response
14-5 Network Operations Compliance
15 Secure Network Troubleshooting
15-1 Network Troubleshooting Concepts
15-2 Secure Network Troubleshooting Tools
15-3 Network Troubleshooting Techniques
15-4 Network Troubleshooting Incident Response
15-5 Network Troubleshooting Best Practices
NAC Deployment Models

NAC Deployment Models

Key Concepts

Network Access Control (NAC) deployment models define how NAC solutions are integrated into the network infrastructure to enforce security policies. Key concepts include:

1. On-Path Deployment

In an On-Path Deployment, NAC solutions are placed directly in the data path, ensuring that all traffic passes through the NAC device for inspection and enforcement. This model provides comprehensive visibility and control over network traffic.

Example: A company deploys an NAC appliance at the gateway between the internal network and the internet. All traffic entering and leaving the network must pass through this appliance, allowing the NAC solution to enforce security policies and inspect traffic for compliance.

2. Out-of-Path Deployment

In an Out-of-Path Deployment, NAC solutions are placed outside the primary data path, typically using network taps orSPAN ports to monitor traffic. This model allows for traffic inspection without impacting network performance.

Example: A university deploys an NAC solution on a SPAN port connected to a core switch. The NAC solution monitors traffic for compliance and security threats without directly affecting the data path, ensuring minimal impact on network performance.

3. Agent-Based Deployment

In an Agent-Based Deployment, NAC solutions use software agents installed on endpoints to enforce security policies. These agents communicate with the NAC server to ensure compliance before allowing network access.

Example: A healthcare organization deploys NAC agents on all employee devices. Before accessing the network, each device must pass a compliance check by the NAC server, ensuring that only compliant devices are granted access.

4. Agentless Deployment

In an Agentless Deployment, NAC solutions do not require software agents on endpoints. Instead, they use network protocols and authentication mechanisms to enforce security policies.

Example: A financial institution deploys an agentless NAC solution that uses 802.1X authentication and RADIUS to enforce security policies. When a device connects to the network, it is authenticated and checked for compliance without needing an agent installed on the device.

5. Hybrid Deployment

In a Hybrid Deployment, NAC solutions combine multiple deployment models to provide comprehensive security and flexibility. This model leverages the strengths of different deployment methods to address specific network requirements.

Example: A large enterprise combines agent-based and on-path deployment models. Critical devices use agent-based enforcement for detailed compliance checks, while general network traffic is monitored and controlled using an on-path NAC appliance.

6. Cloud-Based Deployment

In a Cloud-Based Deployment, NAC solutions are hosted and managed in the cloud. This model provides scalability, flexibility, and centralized management, making it suitable for organizations with distributed networks.

Example: A global retail chain deploys a cloud-based NAC solution. The NAC service is hosted in the cloud, and all branch offices connect to it for network access control. This centralized approach simplifies management and ensures consistent security policies across all locations.

Examples and Analogies

On-Path Deployment can be compared to a toll booth on a highway. Just as all vehicles must pass through the toll booth, all network traffic must pass through the NAC device for inspection and enforcement.

Out-of-Path Deployment is like a traffic camera monitoring a highway. The camera observes traffic without directly affecting the flow, similar to how an NAC solution monitors traffic without impacting the data path.

Agent-Based Deployment is akin to security guards checking IDs at an entrance. Each person must show their ID (agent) to gain access, ensuring only authorized individuals enter.

Agentless Deployment is like a smart lock that uses biometric authentication. The lock verifies identity without needing a physical key (agent), ensuring secure access.

Hybrid Deployment can be compared to a multi-layered security system. Just as a building uses cameras, guards, and alarms for comprehensive security, a hybrid NAC deployment combines multiple methods for robust protection.

Cloud-Based Deployment is like a centralized security service for multiple locations. Just as a central security office monitors all branches, a cloud-based NAC solution provides centralized control and management for distributed networks.