In This Chapter
To determine the level of access that a user receives when he or she authenticates into a NAC-enabled network, the NAC policy server evaluates several elements. Each of these steps is as important as the next in ensuring that NAC can meet the goals of your corporate security policy and its associated network access control policy. This chapter discusses the entire NAC lifecycle so that you can get an overview of the process associated with getting a user and a machine on the corporate network.