User manual

6
Free Tech Support 030-241 77 99 • Sales 030-241 77 77
Network Security and access control
Veri-NAC Network Vulnerability & Access Control
Maximum protection that’s cost-effective
and easy to use.
One-box vulnerability management and network
access control (NAC).
Agentless and non-inline design provides rock-
solid security in an easy-to-deploy appliance.
No infrastructure upgrade needed works with
existing switches.
Works with both wired and wireless devices.
Protects your network from vulnerabilities that
firewalls can’t defend against.
Don’t be the next security breach
headline!
You have a firewall to stop hackers, viruses, and
malware at the network’s edge. A firewall is vital to
safe network operation, but, because it operates at
the edge of your network, it can only protect you
from threats coming from outside your network.
NAC devices, on the other hand, protect your
network from threats originating on the inside.
Unauthorized devices connected to your network
are major threats to any organization. This is what a
NAC appliance is designed to prevent, whether the
vulnerability is a LAN port in a lobby or conference
room, or a wireless access point.
Veri-NAC™ is a family of Network Access Control
(NAC) appliances from Black Box that ensures that
only authorized devices and users gain access to
your network. It also screens computers connected
to your network, returning mobile users, wireless
devices, and new devices for vulnerabilties. If
Veri-NAC detects an untrusted asset, it responds
instantly to shut off network access for that
device protecting your network while keeping
your trusted devices securely on-line.
Designed for simplicity.
Veri-NAC is designed to provide maximum security
in a simple, agentless design that’s also very
affordable. No need for extensive training or
dedicated personnel, no need to install software
agents, no need to upgrade switches—Veri-NAC is
easy to integrate into your network.
Only the trusted.
Veri-NAC only lets computers and devices onto your
network if they comply with standards that you
specify.
Every device has a unique, factory-installed MAC
address. Veri-NAC assembles a profile of each device,
including the MAC address, and only lets known,
trusted devices on the network. It can even detect
and stop a machine trying to get in under a spoofed
MAC address.
Veri-NAC also checks to make sure each connected
machine complies with your standards, including
up-to-date operating system, patch management,
and hardened configurations.
Protects continuously.
Veri-NAC continuously scans your network, looking
for unauthorized devices attempting to obtain an IP
address. In addition, you can schedule the Veri-NAC
to scan attached devices to search for security
vulnerabilities.
LAN
Managing Assets: Trusted or Untrusted
Interpreting Vulnerability
No agents.
Unlike many other NAC systems, Veri-NAC doesn’t
require that you install software agents on
connected machines. This both simplifies installation
and improves security because agents are
vulnerable to hacking.
Cost effective.
Not only is the up-front cost for Veri-NAC often
lower than other solutions, installation and ongoing
maintenance costs are lower, too.
Veri-NAC works with your existing network and
legacy infrastructure, so there’s no need for
expensive upgrades. Plus, Veri-NAC requires no
formal training and minimal installation time, so
even organizations with a limited IT staff can easily
add it to their network security plan without
straining resources.
Sized for every network.
Veri-NAC comes in models for every application
from small-office networks to large enterprise
networks containing thousands of devices. Models
5400/5600/5800 include the Command Center for
secure central management of multiple Veri-NAC
appliances so you can protect your entire
organization from edge to core. These models also
include ISO 27001 Policy Tools to simplify your
organizations compliance efforts.