This document discusses network access control (NAC) technology and how it can protect network assets. It defines NAC as processes and technologies designed to prevent unauthorized or vulnerable systems from accessing the network. The document outlines the basic components of NAC, including common terms like authentication, authorization, endpoint integrity checks, and remediation. It also describes the pre-admission assessment process and post-admission capabilities of NAC to continuously monitor endpoints and enforce policies.