how to accommodate new Lab-tops in corporate network

i got lot of consultant, vendors, franchisees connecting to my network for internet and other work.

how i can control the access and make sure and enforce some white listing of software.

i do not want them to use SNIFFING, SCANNING and other illegal tools.

1) is there any STANDARD for it?
2) what tools are the best tools
osloboyAsked:
Who is Participating?

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

the_endjinnCommented:
I'm afraid this is a very large topic and the answer will depend very much on what your infrastructure is like. Please provide some more details giving a bit of an environment overview and I'm sure we can help.

Basically it sounds like you are after a combination of NAC (Network Access Control) and IPS (Intrusion Prevention System, or IDS where the D stands for detection).

NAC determines whether a device can connect to your network based upon rules, such as compliance with security policies or having up to date anti-virus. IPS/IDS will sit in your environment and detect or act upon network activity which you determine to be against the policies you have defined, such as port scanning or exploitation of certain vulnerabilities.
0
osloboyAuthor Commented:
no no

IPS/IDS, firewall is out of question. we are controlling DHCP leasing and stuff.

Q: how to enforce your software white list on a visitor labtop.

is there any STANDARD related to endures, etc  
0
Rich WeisslerProfessional Troublemaker^h^h^h^h^hshooterCommented:
For the software side of things, I'm not certain how you'd build a white list necessarily... and hope to keep out all inappropriate software on laptops, at least not without some form of IPS/IDS in place.

For the compliance with security policies, I'd just build on what 'the_endjinn' said, and add that it sounds all the world like you are asking for a Network Policy Server.  (But scanning/sniffing, etc... you'll likely need an IDS to spot the traffic, since I'm not sure you can build a list of every possible scanner/sniffer.)
0

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
Acronis True Image 2019 just released!

Create a reliable backup. Make sure you always have dependable copies of your data so you can restore your entire system or individual files.

osloboyAuthor Commented:
which IT standard or part of IT standard deal exactly with this kind of criteria's
0
Rich WeisslerProfessional Troublemaker^h^h^h^h^hshooterCommented:
In ITIL standards, I suppose this would be touched in Service Access and Configuration Management under Service Transition, and in Service Design.

I'm not certain where it would be in the MOF 4.0 framework.
0
osloboyAuthor Commented:
thanks guys, great help for NAC.

on standard side i think ISO 27002 is great thing part A.11. chees
0
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
IT Administration

From novice to tech pro — start learning today.