Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Learning OpenDaylight

You're reading from   Learning OpenDaylight A gateway to SDN (Software-Defined Networking) and NFV (Network Functions Virtualization) ecosystem

Arrow left icon
Product type Paperback
Published in May 2017
Publisher Packt
ISBN-13 9781782174523
Length 336 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Reza Toghraee Reza Toghraee
Author Profile Icon Reza Toghraee
Reza Toghraee
Arrow right icon
View More author details
Toc

Table of Contents (10) Chapters Close

Preface 1. Introduction to SDN - Transformation from Legacy to SDN FREE CHAPTER 2. Overview of OpenDaylight 3. OpenDaylight Installation and Deployment 4. Building a Virtual SDN Test Lab with Virtual Switches 5. Basic Networking with OpenDaylight 6. Overview of OpenDaylight Applications 7. Building SDN Applications for OpenDaylight 8. Network Function Virtualization 9. Building a Software-Driven Data Center with OpenDaylight

What is NAC?


NAC is a method to control and allow only authorized devices to be connected to the network. It is more common for wired network and devices connecting with a hard-wire or a virtual interface to the network. Most wireless networks already have certain access controls available and enforced via 802.1X, WPA to ensure only authorized users or devices can connect to the wireless network.

In a wired network or a standard Ethernet switch, by default, you can connect any device to the network and obtain access. Most networks have a DHCP infrastructure running which provides an IP address to a newly connected device. This makes a wired network vulnerable as an intruder also can physically connect to the network once they get physical access to the premises. An intruder even can find the IP address details of the network in case of absence of a DHCP server in the network.

As per enterprise security best practices and ISO 27001 standards, network policies should be in place and enforced...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image