agents

NAC EI … 1-41 permanent … 1-38,1-40 SNMP … 1-41 transient … 1-39,1-41

AH … 3-39 allow list … 1-20applications

testing for compliance … 3-126

APs

selecting for access control … 3-136,3-143 supplicants … 2-27

assessment

control over network … 2-39 endpoint integrity … 2-34 IT workload … 2-40 network size … 2-25

risk tolerance … 2-18 user cooperation … 2-40 vulnerability … 2-21

viruses and worms … 2-23attack types

external … 2-19 internal … 2-19 malware … 2-20 wireless … 2-38zero-day2-23

attack vectors … 2-19 authentication … 1-7 EAP … 1-46

methods … 1-16 protocols … 1-8,1-23,1-52 requirements … 1-23 server … 1-17,1-19,1-21 two factor … 1-8

authentication, authorization, and accounting See AAA

authorization … 1-8

B

biometrics, as an authentication method … 1-8

C

CBC-MAC

See CCMP

CCMP … 1-32

certificate … 1-23

Challenge Handshake Authentication Protocol (CHAP) … 1-24

Check-up

See endpoint integrity, posture cluster, NAC 800

CS … 1-45,1-46

ES … 1-52,1-55

MS … 1-45,1-46

role in authentication process … 1-48 settings … 3-63

connection types remote access … 2-10 wired … 2-9 wireless … 2-9

core resources laying out … 3-129

credentials

agentless testing … 3-63 login … 1-19

D

deployment methods 802.1X … 1-46

connection type as a factor … 3-56 DHCP … 1-48

inline … 1-51

network infrastructure as a factor … 3-55 options by access control method … 3-53 risk tolerance as a factor … 3-53 selecting … 3-51

DHCP … 1-17,2-32 request … 1-49

DHCP deployment method … 1-43,1-48 helper address … 1-48 multinetting … 1-50 quarantining … 1-48,1-49 selecting … 3-51

digital certificate … 1-23 directory service … 2-31 DNS … 1-19,1-47domain

agentless testing … 3-63domain name service

See DNS

Dynamic Host Configuration Protocol See DHCP

2 – Index