In network access controlled networks, it is desirable to prevent access
to the network by any non-authenticated entities. Access control may be
established through a trusted agent that, in some embodiments, may be
implemented with a management co-processor. In some cases, active
management technology may establish a connection while a host is
inactive. Then, after the host becomes active, the host can attempt to
use the management co-processor connection without obtaining the
necessary authentications. This may be prevented, in some embodiments, by
scanning for an active host and, if such an active host is found,
blocking the host from using a layer 2 authentication channel unless the
host is properly authenticated and has a proper Internet Protocol
address.