Home Page Icon
Home Page
Table of Contents for
Cisco's Network Admission Control
Close
Cisco's Network Admission Control
by Denzil Wessels, Rich Campagna, Jay Kelley
Network Access Control For Dummies®
Copyright
About the Authors
Dedications
Authors' Acknowledgments
Publisher's Acknowledgments
Introduction
Unlocking the Mysteries of NAC
Developing a Knack for NAC
NAC's Evolving Description
A Diagram Is Worth a Thousand Descriptions
The Best NAC Approach
Leveraging What You Have Today
Knowing Why You Want NAC
What Are the Reasons for NAC?
That's Why They're Called Trojan Horses
Where Have You Been?
Wireless Networks and NAC
NAC and Compliance
Be Our Guest
Off-Shoring and Outsourcing
Insider Access and Threats
Keeping Business Running
The NAC Lifecycle
Policy and the NAC Lifecycle
Putting the Pieces Together
Not So Fast...
Let Me In!
We're Watching You
NAC Components
Creating Policy
Dealing with Clients
Enforcement Time
Remediation
SSL VPNs
In the Beginning, There Were SSL VPNs
So ... NAC to Get In
SSL VPN Use Cases
NAC in Your Network
Writing a Corporate Security Policy
What Policies Do You Need?
You Want Me to Do What?
A Living Document: The Security Policy Lifecycle
Getting Started: Standards and Web Resources
Writing Your Own Security Policy
Herding the Cattle
Analyzing the Terrain
A Team Security Blanket
Networking Social
A Clean Desk(top)
Compliant with Compliance
Other Players
1 + 1 = 3?
Help! (Desk)
User-bility
The Cattle Corral
Identifying Who's On My Network
Hey, It's Me
Identity Authentication
Authorizing the Workforce
Verifying that a PC Is Safe
All PCs Are Not Created Equal
Which Device Gets the Trust?
Help! My Machine Is Infected!
Get Scanned in Mid-Stream
Deciding Where to Enforce
Operating Modes
Endpoint/Software Enforcement
Inline Appliances
Network Infrastructure
Other Enforcement
Flipping the Switch
Gearing Up for the Deployment
Evaluation Before Enforcement
What Are Your Best Practices?
Professional Services and Consulting
NAC Architectures
Cisco Network Admission Control (Cisco NAC)
Microsoft Network Access Protection (NAP)
How Microsoft NAP Works
Trusted Network Connect (TNC)
Working with the TNC Architecture
Internet Engineering Task Force (IETF) Network Endpoint Assessment (NEA)
Working Together
The Role of Standards
Making the Case
IETF Standards
IEEE Standards
Open NAC Standards
Extending NAC
Learning from Your Network
Extending NAC Enforcement
Extending NAC on the Endpoint
The Part of Tens
Ten Best Practices
Have a Complete Plan for NAC
Leverage Existing Authentication
Endpoint Compliance
Policy Enforcement
Management
Logging, Reporting, and Auditing
Helpdesk Support
Day-to-Day Operation
Future Expansion
Ten Steps to Planning Your NAC Implementation
Create (or Revise) Your Corporate Security Policy
Build a Cross-Functional Team
Seek Vendor Info and RFPs
Test a Proof of Concept
Implement a Pilot
Rollout a Limited Production
Deploy Full Production with Policy Enforcement
Assess and Re-Evaluate at Regular Intervals
Ten Online Information Sources
Network World on NAC
Trusted Computing Group
IETF NEA
Gartner NAC Marketscope
Forrester NAC Wave
Cisco NAC
Juniper Networks UAC
Symantec NAC
Bradford Networks NAC
Ten Definitions
802.1X
AAA
Endpoint Integrity
Policy Enforcement Point
Statement of Health
Trusted Network Connect
Juniper Networks Unified Access Control
Microsoft Network Access Protection
Cisco's Network Admission Control
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Cisco's Network Admission Control
Index
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset