E

EAP … 1-21, 1-25, 1-53 EAP-

GTC … 1-53

MD5 … 1-26 SIM … 1-17, 1-27 TLS … 1-26, 1-53 TTLS … 1-26

MD5 … 1-53 EAP message … 1-54 EAP method

802.1X supplicant support for … 3-103 and PKI … 3-102

decision tree … 3-101 RADIUS server … 3-104 selecting … 3-20, 3-101

EAP over LAN See EAPOL

EAPOL … 1-25 edge devices … 2-25

EI

See endpoint integrity encryption methods

WLANs … 3-17 endpoint integrity

assessment … 2-34 deployment methods

selecting … 3-51

implementing … 3-133, 3-135, 3-140, 3-143, 3-144 options by access control method … 3-53 posture … 1-42, 1-53

Check-up1-42, 1-47, 1-49, 1-56

Healthy … 1-42, 1-47, 1-49, 1-56

Infected … 1-42, 1-47, 1-49, 1-57

Quarantine … 1-47, 1-49, 1-57

Unknown … 1-42, 1-47, 1-54 quarantine methods … 1-42 requirements … 1-40

testing methods … 3-59 endpoints … 1-11, 2-28

access zones for … 3-131 administrative control over … 3-27, 3-45 assessing capabilities … 3-25, 3-45

ESP … 3-39

European Union (EU) … 2-17

F

Federal Information Security Management Act of 2000 (FISMA) … 2-17

G

Gramm-Leach-Bliley Act (GLBA) … 2-16 groups

policies for … 3-106 guest access … 3-132, 3-135

H

Health Insurance Portability and Accounting Act See HIPAA

Healthy

See endpoint integrity, posture helper address … 1-48

HIPAA … 2-16 hotfixes

testing for … 3-125

I

IAS 1-13, 1-17, 1-46, 3-93

Identity Driven Manager (IDM) … 1-53, 1-56, 1-58, 2-31

access policy group rules … 3-115 access policy groups … 3-100 access profile … 3-107

agent for RADIUS servers … 3-99 allowed resources … 3-109 designing policies … 3-107 dynamic VLANs … 3-109

NAC 800 … 1-52 need for … 3-98

network design parameters … 3-99 QoS settings … 3-114

rate limits … 3-114

VLAN assignments … 3-108 IDS/IPS … 2-24

IKE … 3-38

IMSI … 1-27 Infected

See endpoint integrity, posture infrastructure devices

802.1X supplicants … 3-31

Index – 3

Page 299
Image 299
HP Access Control Client Software manual EAP … 1-21, 1-25, 1-53 EAP GTC …