Index

Numerics

802.111-30 802.11i … 1-32 802.1X

advantages of … 3-13 authentication … 1-21 disadvantages of … 3-13 EAP method, selecting … 3-101 endpoint integrity and … 3-51 quarantine method … 1-42, 1-54, 3-93 supplicant … 1-21, 1-23, 3-20

802.1X deployment method … 1-46, 3-51 802.1X supplicants … 2-27, 2-29, 2-30

EAP methods supported … 3-103 infrastructure devices as … 3-31

A

AAA1-6, 3-79

access control architecture … 3-84 component combinations … 3-79

criteria for selecting … 3-81 NAC 800 … 3-95

designing … 3-8

for existing networks … 3-148 methods … 1-16, 3-13

administrative workload as a factor … 3-24 and endpoint integrity … 3-51 endpoints as a factor … 3-25, 3-27 implementing … 3-132, 3-134, 3-140, 3-143 risk tolerance as a factor … 3-21 security as a factor … 3-15

user sophistication as a factor … 3-22 weighing factors … 3-33

migrating to another solution … 3-149 problems solved … 1-3

access control entries … 1-35 access control list

See ACLs

access control zones … 2-11, 2-33 combining designs … 3-146 private … 3-140

private wired … 2-12 security for … 3-16

private wireless … 2-12, 3-142 security for … 3-17, 3-19

public wired … 2-13, 3-131 security for … 3-15

public wireless … 2-13, 3-134 security for … 3-17, 3-19

remote … 2-13 security for … 3-143

security considerations … 3-15 security policies for … 3-106

access policies

with IDM … 3-107 without IDM … 3-117

access policy groups IDM … 3-100 rules … 3-115

access profile IDM … 3-107

accounting … 1-10 ACEs 1-35 ACLs 1-9, 1-35 ActiveX … 1-41 ActiveX testing

advantages and disadvantages … 3-59, 3-63 requirements … 3-62

Adaptive Edge Architecture … 1-18 administrative control

access control method … 3-27 remote access … 3-45 testing methods … 3-69

administrative workload

access control method … 3-24 remote access … 3-44 testing methods … 3-74

ADSL 1-44 adware 2-21 AEA 1-18 agent

See NAC EI agent agentless testing … 2-37

advantages and disadvantages … 3-64 entering credentials for … 3-65 non-domain members … 3-63 requirements … 3-64

RPC … 3-63

Index – 1

Page 297
Image 297
HP Access Control Client Software manual Index