<P style="MARGIN: 0px">Cisco Network Admission Control</P> <P style="MARGIN: 0px">Volume I: NAC Framework Architecture and Design</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">A guide to endpoint compliance enforcement</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">Today, a v
Cisco Network Admission Control, Volume I: NAC Framework Architecture and Design
โ Scribed by Denise Helfrich, Lou Ronnau, Jason Frazier, Paul Forbes
- Publisher
- Cisco Press
- Year
- 2006
- Tongue
- English
- Leaves
- 244
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Cisco Network Admission Control
Volume I: NAC Framework Architecture and Design
ย
A guide to endpoint compliance enforcement
ย
Today, a variety of security challenges affect all businesses regardless of size and location. Companies face ongoing challenges with the fight against malware such as worms, viruses, and spyware. Todayโs mobile workforce attach numerous devices to the corporate network that are harder to control from a security policy perspective. These host devices are often lacking antivirus updates and operating system patches, thus exposing the entire network to infection. As a result, worms and viruses continue to disrupt business, causing downtime and continual patching. Noncompliant servers and desktops are far too common and are difficult to detect and contain. Locating and isolating infected computers is time consuming and resource intensive.
ย
Network Admission Control (NAC) uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources, thereby limiting damage from emerging security threats. NAC allows network access only to compliant and trusted endpoint devices (PCs, servers, and PDAs, for example) and can restrict the access of and even remediate noncompliant devices.
ย
Cisco Network Admission Control, Volume I, describes the NAC architecture and provides an in-depth technical description for each of the solution components. This book also provides design guidelines for enforcing network admission policies and describes how to handle NAC agentless hosts. As a technical primer, this book introduces you to the NAC Framework solution components and addresses the architecture behind NAC and the protocols that it follows so you can gain a complete understanding of its operation. Sample worksheets help you gather and organize requirements for designing a NAC solution.
ย
Denise Helfrich is a technical program sales engineer that develops and supports global online labs for the World Wide Sales Force Development at Ciscoยฎ.
ย
Lou Ronnau, CCIEยฎ No. 1536, is a technical leader in the Applied Intelligence group of the Customer Assurance Security Practice at Cisco.
ย
Jason Frazier is a technical leader in the Technology Systems Engineering group for Cisco.
ย
Paul Forbes is a technical marketing engineer in the Office of the CTO, within the Security Technology Group at Cisco.ย
ย
- Understand how the various NAC components work together to defend your network
- Learn how NAC operates and identifies the types of information the NAC solution uses to make its admission decisions
- Examine how Cisco Trust Agent and NAC-enabled applications interoperate
- Evaluate the process by which a policy server determines and enforces a policy
- Understand how NAC works when implemented using NAC-L2-802.1X, NAC-L3-IP, and NAC-L2-IP
- Prepare, plan, design, implement, operate, and optimize a network admission control solution
ย ย
This security book is part of the Cisco Pressยฎ Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.
ย
Category: Cisco PressโSecurity
Covers: Network Admission Control
ย
1587052415120506
ย
๐ SIMILAR VOLUMES
The first introduction to the Cisco NAC solution, this text addresses the security risks of remote and mobile computer users connecting to corporate networks. It enables end-point products to communicate security information, allowing networks to restrict access of non-compliant devices to the rest
Cisco Network Admission Control Volume II: NAC Framework Deployment and Troubleshooting The self-defending network in action Jazib Frahim, CCIE(r) No. 5459 Omar Santos David White, Jr., CCIE No. 12,021 When most information security professionals think about threats to their networks, they think abo
<P style="MARGIN: 0px">Cisco Network Admission Control</P> <P style="MARGIN: 0px">Volume II: NAC Framework Deployment and Troubleshooting</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">The self-defending network in action</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">Jazib Fr
Secure the network edge with the premier book on NAC deployment and management * The first book on deploying and managing the Cisco NAC solution * Addresses the security risks of remote and mobile computer users connecting to corporate networks * Enables end-point products (i.e. PCs, servers, and PD
Cisco Systems, 2007. โ 478 pages.<div class="bb-sep"></div>The e-commerce module enables organizations to support e-commerce applications through the Internet. The e-commerce module uses multiple component design techniques that have been discussed in this course. The first lesson reviews how high a