Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Network Access Control (NAC): 802.1X, RADIUS, Posture Assessment und Zero-Trust-Integration

Comprehensive Guide to Network Access Control (NAC): IEEE 802.1X port-based access control, RADIUS servers (FreeRADIUS, Cisco ISE, Microsoft NPS), EAP-TLS and PEAP, Posture Assessment (Patch Status, Antivirus, Disk Encryption), VLAN-Based Quarantine, BYOD Strategies (MDM Enrollment, ZTNA), Guest Networks, MAC Address Bypass for IoT, and a Comparison of Leading NAC Solutions (Cisco ISE, Aruba ClearPass, Portnox, Forescout). Includes a rollout roadmap and NAC as a zero-trust building block.

Table of Contents (10 sections)

Every device that connects to the corporate network is a potential entry point for attackers. An unmanaged laptop, a personal smartphone, an IoT device—all can introduce malicious code or serve as a foothold for lateral movement. Network Access Control (NAC) prevents unmanaged devices from entering the corporate network by verifying the following before granting access: Who is the device? Does it belong to us? Is it up to date? Is antivirus active?

802.1X: Port-based access control

IEEE 802.1X – the foundation of NAC:

Roles:
  Supplicant:     Device requesting access (Windows, Linux, iPhone)
  Authenticator:  Network device (switch port, Wi-Fi access point)
  Auth server:    RADIUS server (verifies identity)

NAC process (802.1X):

  Device connects to switch port:
  ┌──────────┐  EAPOL start   ┌──────────┐  RADIUS   ┌──────────┐
  │  Client  │ ─────────────> │  Switch  │ ─────────> │   ISE    │
  │(Supplicant)│ <── EAP Req ── │(Authenticator)│ <── Policy ── │(Policy)  │
  │          │ ── EAP Resp ─> │          │           │  Server  │
  │          │ <── Success ── │          │           │          │
  └──────────┘                └──────────┘           └──────────┘

  Process:
  1. Device connects to switch port
  2. Switch: Port locked (only 802.1X traffic allowed)
  3. Switch sends EAP Request/Identity to device
  4. Device sends EAP Response/Identity (username or certificate)
  5. Switch forwards to RADIUS (RADIUS Access Request)
  6. RADIUS verifies identity:
     → Success: RADIUS Access Accept → Switch opens port → VLAN assigned
     → Error: RADIUS Access Reject → Switch keeps port blocked

  Result:
  → Auth OK + Posture OK: Normal VLAN (productive)
  → Auth OK + Posture Fail: Quarantine VLAN (update server only)
  → Auth Fail: No access or Guest VLAN
  → Unknown device: MAB (MAC Authentication Bypass) → Guest VLAN

EAP methods (important!):

  EAP-TLS:
  → Mutual certificate authentication (client + server)
  → Strongest method! (no password attacks possible)
  → Prerequisite: PKI (CA + client certificates)
  → Use: Corporate devices (Intune/Jamf deployed certs)

  PEAP-MSCHAPv2:
  → Server certificate + username/password (AD credentials)
  → Easier to deploy than EAP-TLS
  → Weaker: Password attacks possible (if server certificate is not validated!)
  → IMPORTANT: Supplicant must validate server certificate!
             (Otherwise: Man-in-the-middle attack possible!)

  PEAP-EAP-TLS:
  → PEAP tunnel + EAP-TLS inside → very strong, very complex

  EAP-TTLS:
  → Similar to PEAP, more identity protection

RADIUS Server Configuration

FreeRADIUS (Open Source):

# Installation on Ubuntu:
apt install freeradius freeradius-utils

# /etc/freeradius/3.0/clients.conf - Register switches/APs:
client switch-floor1 {
    ipaddr          = 192.168.1.10
    secret          = "StrongRADIUSSecret123!"
    nastype         = cisco
    shortname       = sw-floor1
}

client wlan-ap-01 {
    ipaddr          = 192.168.1.20
    secret          = "AnotherSecureSecret!"
    nastype         = cisco_aironet
}

# /etc/freeradius/3.0/mods-available/ldap - AD integration:
ldap {
    server          = "ldap://dc01.company.local"
    identity        = "CN=radius-svc,OU=ServiceAccounts,DC=company,DC=local"
    password        = "ServiceAccountPassword"
    base_dn         = "DC=company,DC=local"
    user {
        base_dn     = "${..base_dn}"
        filter      = "(sAMAccountName=%{%{Stripped-User-Name}:-%{User-Name}})"
    }
    group {
        base_dn     = "${..base_dn}"
        filter      = "(objectClass=groupOfNames)"
        membership_attribute = "memberOf"
    }
}

# VLAN assignment based on AD group:
if (LDAP-Group == "CN=Corp-Network,OU=Groups,DC=company,DC=local") {
    reply:Tunnel-Type := VLAN
    reply:Tunnel-Medium-Type := IEEE-802
    reply:Tunnel-Private-Group-Id := "10"    # VLAN 10 = Corporate
}
elsif (LDAP-Group == "CN=Guest-Network,OU=Groups,DC=company,DC=local") {
    reply:Tunnel-Private-Group-Id := "99"    # VLAN 99 = Guest
}
else {
    reply:Tunnel-Private-Group-Id := "998"   # VLAN 998 = Quarantine
}

Microsoft NPS (Network Policy Server):
# Integrated into Windows Server (not a separate product):
# Server Manager → Add Roles → Network Policy and Access Services → NPS

# NPS policy for 802.1X:
# Connection Request Policy:
#   → Type: 802.1X (Wired/Wireless)
#   → Auth-Method: PEAP-MSCHAPv2 or EAP-TLS

# Network Policy:
#   → Condition: Windows Groups = "CORP\Domain Computers"
#   → Permission: Grant Access
#   → Settings: VLAN attributes (Tunnel Type, Tunnel Medium Type, VLAN ID)

Supplicant Configuration

Windows 802.1X Configuration via GPO:

# Group Policy: Computer → Windows Settings → Security Settings →
#               Wired Network (IEEE 802.3) Policies

# Linux wpa_supplicant (EAP-TLS):
# /etc/wpa_supplicant/wpa_supplicant.conf:
ctrl_interface=/run/wpa_supplicant
network={
    ssid="CORP-WLAN"
    scan_ssid=1
    key_mgmt=WPA-EAP
    eap=TLS
    identity="host/laptop01.company.local"
    ca_cert="/etc/ssl/certs/company-ca.crt"
    client_cert="/etc/ssl/certs/laptop01.crt"
    private_key="/etc/ssl/private/laptop01.key"
}

# Intune: EAP-TLS Wi-Fi Profile (iOS/Android/Windows):
# Device Configuration → Profiles → Wi-Fi → Enterprise
# EAP Type: TLS
# Certificate server names: radius.company.local
# Root certificate: Company Internal CA
# Client certificate: SCEP/PKCS cert from Intune

MAC Address Bypass for Legacy Devices

MAC Authentication Bypass (MAB) for IoT/Printers:

The Problem:
  → Printers, IP phones, IoT sensors: do not support 802.1X
  → Still need to access the network (but in a controlled manner!)

MAB Solution:
  → Switch sends device’s MAC address as a RADIUS request
  → RADIUS compares MAC with whitelist
  → If match: Access Accept + VLAN assignment

  # RADIUS MAB Policy (FreeRADIUS):
  # MAC Whitelist (format: XX-XX-XX-XX-XX-XX in lowercase):
  aa-bb-cc-dd-ee-ff Cleartext-Password := "aa-bb-cc-dd-ee-ff"
      Tunnel-Type = VLAN,
      Tunnel-Medium-Type = IEEE-802,
      Tunnel-Private-Group-Id = "20"   # VLAN 20 = Printer VLAN

Security limitations of MAB:
  ⚠️ MAC addresses are easy to spoof!
  ⚠️ An attacker can use any MAC address (MAC spoofing)
  → Use MAB only for low-trust devices + dedicated security VLAN
  → Perform posture assessment additionally (if possible)

Posture Assessment - Checking Device Status

What NAC can check on the device:

Posture checks (examples, Cisco ISE):

1. Operating system compliance:
   □ Windows version: min. Windows 10 22H2?
   □ macOS version: min. 14.x (Sonoma)?
   → Older versions → Quarantine → Update page

2. Patch level:
   □ Windows Update: all critical patches installed?
   □ Check WSUS/SCCM status or WMI directly
   → Not up to date: Quarantine + Update server accessible

3. Antivirus/EDR:
   □ Which AV solution? Version? Definitions up to date?
   □ Defender enabled? Real-time protection on?
   □ Compliant EDR product installed?
   → No AV/EDR: Quarantine

4. Disk Encryption:
   □ BitLocker (Windows): active? Escrowed?
   □ FileVault (macOS): active?
   → Not encrypted: Quarantine

5. Firewall:
   □ Windows Firewall enabled?
   □ All profiles (Domain/Private/Public)?

6. Domain Membership:
   □ Device in AD domain? → Managed Device
   □ AAD Join (Entra ID)? → Cloud-Managed
   → Not in domain: BYOD treatment

7. Software Inventory:
   □ Unauthorized software installed? (Torrent, remote tools?)
   → Non-compliant software: Warning or quarantine

Agent-based vs. Agentless:

Agent-based:
  → NAC agent installed on device
  → Deep scanning possible (all checks listed above)
  → Issue: Agent management, updates, BYOD does not accept an agent

Agentless:
  → No software on device
  → Checks: MAB (MAC address), DHCP fingerprint, mDNS
  → Weaker checks (device type detected, not patch level)
  → For printers, cameras, IoT devices (no agent possible!)
  → For BYOD: limited control

Posture Workflow:
  1. Device connects → 802.1X authentication successful
  2. NAC detects client agent (or agent checks itself)
  3. Agent checks posture requirements
  4. Result:
     → Compliant: Full Access VLAN
     → Non-Compliant: Quarantine VLAN
     → Unknown: Limited access (for initial registration)

VLAN-based segmentation

NAC VLANs and zone model:

VLAN structure (typical):
  VLAN 10 - Corporate:         Managed, compliant Windows/macOS, domain-joined
  VLAN 20 - BYOD/Mobile:       Personal device, MDM enrollment, restricted
  VLAN 30 - Guest:              No corporate access, Internet only
  VLAN 40 - Quarantine:        Non-compliant, remediation server only
  VLAN 50 - IoT:               Printers, cameras, sensors, isolated
  VLAN 60 - VoIP:              IP phones, QoS prioritized
  VLAN 70 - Server:            Production servers, restricted access
  VLAN 98 - Management:        Network admins, network devices
  VLAN 998 - Quarantine:       Non-compliant, remediation

VLAN assignment via NAC:
  802.1X Authentication + Posture OK → Corporate VLAN 10
  MDM Enrollment + BYOD Policy → BYOD VLAN 20
  No Authentication / Unknown Device → Guest VLAN 30
  Posture Fail (AV missing) → Quarantine VLAN 40
  MAC of known printer (MAB) → IoT VLAN 50

Quarantine VLAN Design:
  → Allowed: DHCP, DNS, HTTP/HTTPS (internal remediation servers only)
  → Blocked: all other hosts on the network!
  → Remediation page: explains problem + solution
  → After remediation: Posture reassessment + correct VLAN

Guest networks:
  → Completely isolated from internal resources
  → Internet access: restricted (no P2P, bandwidth limit)
  → Captive portal: Terms of Service acceptance, time limit
  → Wi-Fi SSID: "Guest" (separate from corporate SSID)
  → No VPN tunnels into the corporate network from the guest VLAN!

BYOD Integration and Mobile

BYOD (Bring Your Own Device) with NAC:

Challenges:
  → Personal devices do not support a full NAC agent
  → GDPR: Employers cannot inspect personal data on personal devices
  → Compliance: How to ensure compliance without full control?

BYOD-NAC Strategies:

Strategy 1 - MDM Enrollment (Hybrid):
  → Device must be enrolled in MDM (Intune, Jamf)
  → MDM profile: device encryption, PIN requirement, VPN profile
  → NAC checks MDM enrollment status via API
  → MDM compliance → BYOD VLAN (restricted, but productive)
  → No MDM → Guest VLAN or no access

  Privacy Compromise (MDM on Personal Devices):
  → Apple: User Enrollment (MAM only, no device wipe!)
  → Android: Work Profile (separates personal/work)
  → Employer sees ONLY the Work Profile, not personal apps/data

Strategy 2 - Certificate-Based BYOD:
  → User receives client certificate after registration
  → Certificate on personal device (keystore)
  → 802.1X with EAP-TLS: Certificate for authentication
  → No posture check (no full compliance)
  → BYOD VLAN: limited resources

Strategy 3 - ZTNA instead of LAN access:
  → Personal device: NO network access!
  → Application access only via ZTNA (Zero Trust Network Access)
  → Secure Enclave/Sandbox app: only company apps in an isolated environment
  → No access to internal network → no lateral movement risk
  → Recommended: Cloudflare Access, Zscaler Private Access, Microsoft Entra ID

BYOD Policy (Legal Requirements):
  □ Written consent: Device may be managed
  □ Clear scope: Which data/apps on the personal device
  □ Remote wipe policy: Only work container, not the entire device
  □ Separation: Personal vs. work (Work Profile)
  □ Privacy policy: What data is collected via the device?

Comparison of NAC Solutions

Leading NAC Products:

Cisco Identity Services Engine (ISE):
  Strengths:
    → Market leader, deep Cisco integration
    → Comprehensive posture assessment
    → pxGrid integration: context sharing with other security solutions
    → TrustSec (SGT): software-defined segmentation
    → Profiling: automatic device detection (over 7,000 profiles!)
  Weaknesses:
    → High licensing costs ($$$)
    → Complex implementation (typically 6–12 months!)
    → High hardware requirements
  Recommendation: For Cisco-centric enterprises, starting at ~$50/device/year

Aruba ClearPass (HPE):
  Strengths:
    → Vendor-agnostic (works with Cisco, Juniper, Aruba)
    → Strong BYOD workflows
    → OnGuard Agent for deep posture assessment
    → Good API for automation
  Weaknesses:
    → Complex, requires expertise
    → Aruba switches for best integration
  Recommendation: Best BYOD workflow, vendor-agnostic

Microsoft Network Policy Server (NPS):
  Strengths:
    → Free (in Windows Server)
    → Native AD integration
    → Good for pure Microsoft environments
  Weaknesses:
    → Limited posture capabilities (domain check only)
    → No modern zero-trust features
    → Legacy architecture
  Recommendation: As a starter/supplement, not as a primary NAC

Portnox Cloud:
  Strengths:
    → Cloud-native NAC (no on-premises server!)
    → Easier to implement than Cisco ISE
    → BYOD-friendly
    → Azure AD / Entra ID integration
  Weaknesses:
    → Less powerful than ISE in complex scenarios
    → Relatively new platform

Forescout Platform:
  Strengths:
    → Agentless: detects all devices without an agent
    → IoT/OT specialist: detects industrial devices
    → No 802.1X requirement (works with legacy switches)
  Recommendation: For OT/IoT environments + legacy networks

Selection criteria:
  □ Network vendor: Cisco → ISE; Aruba → ClearPass; Mixed → Forescout/Portnox
  □ Budget: Small → Microsoft NPS + Portnox; Large → ISE/ClearPass
  □ IoT proportion: High → Forescout (agentless)
  □ Cloud-first: → Portnox or ZTNA instead of classic NAC
  □ BYOD focus: → Aruba ClearPass (best BYOD workflow)

NAC as a Zero-Trust component

NAC in a Zero-Trust Context:

Zero-Trust Principle: "Never trust, always verify"
NAC Contribution:
  → Device must identify itself (802.1X / certificate)
  → Device must demonstrate compliance (posture)
  → Access is context-dependent (VLAN/segment per device/role)
  → Continuous verification (posture regularly re-evaluated)

NAC + Conditional Access (Microsoft):
  → Intune: marks devices as compliant/non-compliant
  → Azure AD Conditional Access:
    → Device must be "Intune compliant" for O365 access
    → Can be combined with NAC: non-compliant → Quarantine + no O365

Implementation Recommendation:
  Start:      Wi-Fi first (simpler, fewer devices)
  Phase 2:    Wired LAN (more complex)
  Phase 3:    IoT devices + MAB
  Phase 4:    Posture Assessment
  → Never do everything at once: roll out in phases!

Implementation Roadmap

NAC Rollout Phases (typically 12–18 months):

Phase 1 (Months 1–3): Inventory and Design
  □ Map all network segments
  □ Identify all device categories (PC, mobile, printer, IoT)
  □ Design VLAN concept
  □ Policy requirements (HR, Legal for BYOD policy)
  □ Select NAC product + PoC

Phase 2 (Months 4–6): Pilot
  □ Configure 802.1X on pilot switches (not production!)
  □ 50–100 pilot users: corporate Windows devices
  □ Test authentication + basic posture
  □ Define help desk processes (NAC issues → how to resolve?)
  □ Exception process: who gets exceptions?

Phase 3 (Months 7–9): BYOD + Mobile
  □ MDM enrollment workflow
  □ BYOD VLAN + policies
  □ Certificate distribution for EAP-TLS
  □ Guest Wi-Fi + captive portal

Phase 4 (Months 10–12): IoT and Legacy
  □ MAB for printers, cameras, phones
  □ Profiling: automatic device detection
  □ IoT VLAN + microsegmentation
  □ Legacy devices: exceptions or replacement

Phase 5 (Months 13–18): Full rollout + monitoring
  □ All switches/Wi-Fi networks migrated
  □ Monitoring: NAC dashboard + SIEM integration
  □ Regular policy reviews (quarterly)
  □ Incident playbooks: NAC failure, false positives

Key Performance Indicators (KPIs):
  → % of devices under NAC control (Target: >95%)
  → Unmanaged devices detected (Target: <5%)
  → Quarantine events/week (Trend: decreasing!)
  → Mean Time to Remediate (Quarantine → Compliance)
  → NAC Availability: >99.9%

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Chris Wojzechowski
Chris Wojzechowski

Geschäftsführender Gesellschafter

E-Mail

Geschäftsführender Gesellschafter der AWARE7 GmbH mit langjähriger Expertise in Informationssicherheit, Penetrationstesting und IT-Risikomanagement. Absolvent des Masterstudiengangs Internet-Sicherheit an der Westfälischen Hochschule (if(is), Prof. Norbert Pohlmann). Bestseller-Autor im Wiley-VCH Verlag und Lehrbeauftragter der ASW-Akademie. Einschätzungen zu Cybersecurity und digitaler Souveränität erschienen u.a. in Welt am Sonntag, WDR, Deutschlandfunk und Handelsblatt.

10 Publikationen
  • Einsatz von elektronischer Verschlüsselung - Hemmnisse für die Wirtschaft (2018)
  • Kompass IT-Verschlüsselung - Orientierungshilfen für KMU (2018)
  • IT Security Day 2025 - Live Hacking: KI in der Cybersicherheit (2025)
  • Live Hacking - Credential Stuffing: Finanzrisiken jenseits Ransomware (2025)
  • Keynote: Live Hacking Show - Ein Blick in die Welt der Cyberkriminalität (2025)
  • Analyse von Angriffsflächen bei Shared-Hosting-Anbietern (2024)
  • Gänsehaut garantiert: Die schaurigsten Funde aus dem Leben eines Pentesters (2022)
  • IT Security Zertifizierungen — CISSP, T.I.S.P. & Co (Live-Webinar) (2023)
  • Sicherheitsforum Online-Banking — Live Hacking (2021)
  • Nipster im Netz und das Ende der Kreidezeit (2017)
IT-Grundschutz-Praktiker (TÜV) IT Risk Manager (DGI) § 8a BSIG Prüfverfahrenskompetenz Ausbilderprüfung (IHK)
This article was last edited on 08.03.2026. Responsible: Chris Wojzechowski, Geschäftsführender Gesellschafter at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"

Cookielose Analyse via Matomo (selbst gehostet, kein Tracking-Cookie). Datenschutzerklärung