Improve company productivity with a Business Account.Sign Up

x
?
Solved

NAP and NAC

Posted on 2009-04-06
3
Medium Priority
?
399 Views
Last Modified: 2012-05-06
Hi i need some doubt about nap and nac

our infreastructre we are using microsoft and cisco product

NAP and NAC is needed or not?

How does NAP get synched from CISCO linux op system
If a new address bank is added to the CISCO router how does it get registered in NAP and NAC in terms of man
 Does DHCP/Fixed IP clients require pre-registering

 For Fixed IP and DHCP, which of the NAP and NAC is better suited

please give me this answer

Regards

Rajeeve
0
Comment
Question by:Globrin
2 Comments
 

Author Comment

by:Globrin
ID: 24082777
hi,

please any one can give me little smal answer to this qustion?

Regards,

Rajeeve jose
0
 
LVL 38

Accepted Solution

by:
Rich Rumble earned 2000 total points
ID: 24124164
Depends on your NAC solution, cisco's will learn about the new subnet on it's own, Microsoft's NAP will not until you tell it about that subnet.
-rich
0

Featured Post

Easily Design & Build Your Next Website

Squarespace’s all-in-one platform gives you everything you need to express yourself creatively online, whether it is with a domain, website, or online store. Get started with your free trial today, and when ready, take 10% off your first purchase with offer code 'EXPERTS'.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Are you looking to start a business? Do you own and operate a small company? If so, here are some courses you need to take before you hire a full-time IT staff.
Feeling responsible for an unfortunate ransomware infection on my parent's network, persistence paid off as I was able to decrypt a strain of ransomware that was not previously (or at least publicly) cracked. I hope this helps others out there affec…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

585 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question