Can anyone tell me if its possible that a malicious user on a Cisco NAC enabled network can: 1. Authenticate to the network using a validated/compliant host 2. Unplug from the network 3. Move a rogue host on using the same MAC/IP (static) address. ....then access all resources as the authenticated host.