{"id":7347,"date":"2018-03-22T16:46:27","date_gmt":"2018-03-22T20:46:27","guid":{"rendered":"https:\/\/med.sites.unc.edu\/it\/?page_id=7347"},"modified":"2018-05-23T10:30:34","modified_gmt":"2018-05-23T14:30:34","slug":"network-access-control","status":"publish","type":"page","link":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/","title":{"rendered":"Network Access Control"},"content":{"rendered":"<h2>What do you need to know?<\/h2>\n<p>Implementing Network Access Control reduces the risk of spreading malware by preventing machines with certain security vulnerabilities from connecting to the network. This will provide an additional layer of protection for your computer and data.<\/p>\n<h2>Who is affected?<\/h2>\n<p>Anyone that connects to the School of Medicine wired network to access the internet must install the NAC agent on their device.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-7880 alignright\" src=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up-150x68.png\" alt=\"\" width=\"318\" height=\"144\" srcset=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up-150x68.png 150w, https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up-300x135.png 300w, https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up.png 310w\" sizes=\"auto, (max-width: 318px) 100vw, 318px\" \/><\/p>\n<h2>What action do you need to take?<\/h2>\n<p>If you do not have the NAC agent installed you will be re-directed to a website with instructions on what you need to do to connect to the network.\u00a0 The setup should take only a few minutes. Please review the <a class=\"internal-link\" href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/nac-remediation-guide\/\">NAC Remediation Guide<\/a>\u00a0for the steps to install the NAC agent onto your machine.<\/p>\n<p><b>If your computer is already joined to the campus Active Directory (AD) domain, the NAC agent <\/b><b>may already be installed on your computer<\/b><b>.<\/b><\/p>\n<h3>For more information about NAC, please visit the links below:<\/h3>\n<ul>\n<li><a class=\"internal-link\" href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/network-access-control-overview\/\">What is Network Access Control?<\/a><\/li>\n<li><a class=\"internal-link\" href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/network-access-control-overview#section-2\">How does Network Access Control work?<\/a><\/li>\n<li><a class=\"internal-link\" href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/network-access-control-overview#section-3\">How is Network Access Control being used?<\/a><\/li>\n<li><a class=\"internal-link\" href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/network-access-control-overview#section-4\">How do I configure Network Access Control?<\/a><\/li>\n<li><a class=\"internal-link\" href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/network-access-control-overview#section-6\">Other Frequently Asked Questions<\/a><\/li>\n<\/ul>\n<h3>Federal Requirements<\/h3>\n<p>The Higher Education Opportunity Act requires universities to implement an education plan to combat the illegal use of peer-to-peer or file-sharing networks. NAC is an educational tool targeting students with file-sharing programs on their computers, as opposed to other forms of communication which reach all students, even though the majority of students do not violate copyright or UNC Acceptable Use policies. UNC feels that NAC will benefit students since many students who receive copyright complaints state that they were unaware that file-sharing software was installed or running. Now students will be made aware, hopefully before it\u2019s too late and they are involved in a lawsuit.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What do you need to know? Implementing Network Access Control reduces the risk of spreading malware by preventing machines with certain security vulnerabilities from connecting to the network. This will provide an additional layer of protection for your computer and data. Who is affected? Anyone that connects to the School of Medicine wired network to &hellip; <a href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/\" aria-label=\"Read more about Network Access Control\">Read more<\/a><\/p>\n","protected":false},"author":72183,"featured_media":0,"parent":7344,"menu_order":11,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"layout":"","cellInformation":"","apiCallInformation":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-7347","page","type-page","status-publish","hentry","odd"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Network Access Control | Information Technology<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Access Control | Information Technology\" \/>\n<meta property=\"og:description\" content=\"What do you need to know? Implementing Network Access Control reduces the risk of spreading malware by preventing machines with certain security vulnerabilities from connecting to the network. This will provide an additional layer of protection for your computer and data. Who is affected? Anyone that connects to the School of Medicine wired network to &hellip; Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-23T14:30:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up-150x68.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/\",\"name\":\"Network Access Control | Information Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up-150x68.png\",\"datePublished\":\"2018-03-22T20:46:27+00:00\",\"dateModified\":\"2018-05-23T14:30:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#primaryimage\",\"url\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up.png\",\"contentUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up.png\",\"width\":310,\"height\":140},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.med.unc.edu\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Self Help Guides\",\"item\":\"https:\/\/www.med.unc.edu\/it\/guide\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Network Connections\",\"item\":\"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Network Access Control\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#website\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"name\":\"School of Medicine IT\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#organization\",\"name\":\"UNC School of Medicine Information Technology\",\"url\":\"https:\/\/www.med.unc.edu\/it\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"contentUrl\":\"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png\",\"width\":1217,\"height\":151,\"caption\":\"UNC School of Medicine Information Technology\"},\"image\":{\"@id\":\"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Access Control | Information Technology","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/","og_locale":"en_US","og_type":"article","og_title":"Network Access Control | Information Technology","og_description":"What do you need to know? Implementing Network Access Control reduces the risk of spreading malware by preventing machines with certain security vulnerabilities from connecting to the network. This will provide an additional layer of protection for your computer and data. Who is affected? Anyone that connects to the School of Medicine wired network to &hellip; Read more","og_url":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/","og_site_name":"Information Technology","article_modified_time":"2018-05-23T14:30:34+00:00","og_image":[{"url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up-150x68.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/","url":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/","name":"Network Access Control | Information Technology","isPartOf":{"@id":"https:\/\/www.med.unc.edu\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#primaryimage"},"image":{"@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#primaryimage"},"thumbnailUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up-150x68.png","datePublished":"2018-03-22T20:46:27+00:00","dateModified":"2018-05-23T14:30:34+00:00","breadcrumb":{"@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#primaryimage","url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up.png","contentUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2018\/05\/NACPop-up.png","width":310,"height":140},{"@type":"BreadcrumbList","@id":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/network-access-control\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.med.unc.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Self Help Guides","item":"https:\/\/www.med.unc.edu\/it\/guide\/"},{"@type":"ListItem","position":3,"name":"Network Connections","item":"https:\/\/www.med.unc.edu\/it\/guide\/network-connections\/"},{"@type":"ListItem","position":4,"name":"Network Access Control"}]},{"@type":"WebSite","@id":"https:\/\/www.med.unc.edu\/it\/#website","url":"https:\/\/www.med.unc.edu\/it\/","name":"School of Medicine IT","description":"","publisher":{"@id":"https:\/\/www.med.unc.edu\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.med.unc.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.med.unc.edu\/it\/#organization","name":"UNC School of Medicine Information Technology","url":"https:\/\/www.med.unc.edu\/it\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","contentUrl":"https:\/\/www.med.unc.edu\/it\/wp-content\/uploads\/sites\/477\/2019\/03\/InformationTechnology_logo_rgb_h.png","width":1217,"height":151,"caption":"UNC School of Medicine Information Technology"},"image":{"@id":"https:\/\/www.med.unc.edu\/it\/#\/schema\/logo\/image\/"}}]}},"_links_to":[],"_links_to_target":[],"_links":{"self":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/7347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/users\/72183"}],"replies":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/comments?post=7347"}],"version-history":[{"count":0,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/7347\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/pages\/7344"}],"wp:attachment":[{"href":"https:\/\/www.med.unc.edu\/it\/wp-json\/wp\/v2\/media?parent=7347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}