Network access control has a well-deserved reputation for being difficult and time-consuming to deploy. Knowing what devices can be trusted and what devices are in compliance with corporate policies typically requires the deployment of yet another agent. Even when an NAC agent is deployed, there is still the difficult task of configuring the network to support a quarantine mechanism for pre- and postadmission compliance checks.