Can anyone tell me if its possible that a malicious user on a Cisco NAC enabled network can:
- Authenticate to the network using a validated/compliant host
- Unplug from the network
- Move a rogue host on using the same MAC/IP (static) address.
...then access all resources as the authenticated host.