inline deployment method … 1-51 quarantining … 1-43, 1-52 selecting … 3-51

integrity posture

See endpoint integrity International Mobile Subscriber Identity

See IMSI

Internet Authentication Service See IAS

IPsec … 3-38

J

Juniper Steel-Belted RADIUS … 1-13

K

Ki … 1-27

L

L2TP … 3-38

Lightweight EAP (LEAP) … 1-26, 1-53

M

Mac

testing endpoints … 3-127 MAC-Auth1-16

advantages of … 3-13 AP implements … 1-31 AP support for … 2-27 disadvantages of … 3-13 endpoint integrity and … 3-52 process … 1-17

process illustrated … 1-18 WLANs … 3-19

macros

security settings … 2-38 testing … 3-125

malware … 2-21 MD5 … 1-26 Michael … 1-32 MS-CHAP1-25, 1-53 multinetting … 1-50

multi-site access control architecture autonomous … 3-84 distributed AAA … 3-84

fully centralized … 3-84 fully distributed … 3-84

N

NAC 800

as PDP … 1-53

as RADIUS server … 1-13, 3-94 component combinations … 3-95 EI-only1-45

number of, needed … 3-96 RADIUS-only1-52 tests … 2-34

NAC EI agent

advantages and disadvantages … 3-59, 3-62 downloading … 3-60

requirements for testing … 3-61 See also agents

NAC policies

creating … 3-120, 3-121 groups … 3-120

NASs 1-6, 1-12

network access control process … 1-15 Network Immunity Manager … 2-24 network infrastructure

deployment methods … 3-55 remote access … 3-47

network interface card … 1-16 network overhead

testing methods … 3-75 network security design

core segment … 3-129 implementing … 3-129 private wired zone … 3-140 private wireless zone … 3-142 public wired zone … 3-131 public wireless zone … 3-134 remote zone … 3-143 selecting APs … 3-136, 3-143

selecting switches … 3-133, 3-137, 3-141 NIC … 1-16

4 – Index

Page 300
Image 300
HP Access Control Client Software manual See Imsi