Cisco Network Admission Control Volume II: NAC Framework Deployment and Troubleshooting The self-defending network in action Jazib Frahim, CCIE(r) No. 5459 Omar Santos David White, Jr., CCIE No. 12,021 When most information security professionals think about threats to their networks, they think abo
Cisco Network Admission Control, Volume II: Deployment and Troubleshooting
โ Scribed by Omar Santos, Jazib Frahim
- Publisher
- Cisco Press
- Year
- 2005
- Tongue
- English
- Leaves
- 614
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Secure the network edge with the premier book on NAC deployment and management * The first book on deploying and managing the Cisco NAC solution * Addresses the security risks of remote and mobile computer users connecting to corporate networks * Enables end-point products (i.e. PCs, servers, and PDAs) to communicate security information, allowing networks to restrict access of non-compliant devices to the rest of the networkNetwork Admission Control (NAC), a set of technologies and solutions built on an industry initiative led by Cisco, uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources, thereby limiting damage from emerging security threats. Customers using NAC can allow network access only to compliant and trusted end-point devices (PCs, servers, and PDAs, for example) and can restrict the access of noncompliant devices. The purpose of Cisco Network Admission Control Volume II is to provide a comprehensive guide on how to deploy and troubleshoot phase 2 of NAC to protect networks from attacks and threats and to ultimately create a self-defending network. By highlighting what protection NAC provides when a virus outbreak occurs, this book is a guide for any network professional who manages network security and monitors organizational infrastructure for day-zero threats.
๐ SIMILAR VOLUMES
<P style="MARGIN: 0px">Cisco Network Admission Control</P> <P style="MARGIN: 0px">Volume II: NAC Framework Deployment and Troubleshooting</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">The self-defending network in action</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">Jazib Fr
<P style="MARGIN: 0px">Cisco Network Admission Control</P> <P style="MARGIN: 0px">Volume I: NAC Framework Architecture and Design</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">A guide to endpoint compliance enforcement</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">Today, a v
<P style="MARGIN: 0px">Cisco Network Admission Control</P> <P style="MARGIN: 0px">Volume I: NAC Framework Architecture and Design</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">A guide to endpoint compliance enforcement</P> <P style="MARGIN: 0px">ย </P> <P style="MARGIN: 0px">Today, a v
The first introduction to the Cisco NAC solution, this text addresses the security risks of remote and mobile computer users connecting to corporate networks. It enables end-point products to communicate security information, allowing networks to restrict access of non-compliant devices to the rest
<P style=''MARGIN: 0px''>ย </P> <P style=''MARGIN: 0px''>This is the only complete, all-in-one guide to deploying, running, and troubleshooting wireless networks with Ciscoยฎ Wireless LAN Controllers (WLCs) and Lightweight Access Point Protocol (LWAPP)/Control and Provisioning of Wireless Access Poin