R

radio ports See RPs

RADIUS … 1-6

RADIUS servers … 1-13, 1-46, 2-31 attribute-value pairs … 1-28 centralizing policies … 3-85 component combinations … 3-79 decision tree … 3-91

EAP method … 3-104

eliminating inter-site traffic … 3-87 endpoint integrity … 1-43

IAS … 1-13, 3-93

Juniper Steel-Belted1-13 messages … 1-28

NAC 800 … 1-13, 1-52, 3-94 no endpoint integrity … 3-79 number of, needed … 3-89 performance … 3-89 reducing inter-site traffic … 3-88 redundancy … 3-89

selecting … 3-78, 3-90 vendor-specific attributes … 1-29 wireless … 1-13

with endpoint integrity … 3-93 RADIUS-CHAP1-24, 1-30 RADIUS-PAP1-24, 1-30

Rapid Spanning Tree Protocol … 1-52 rate limits … 3-114

redundancy

RADIUS servers … 3-89 regulations … 2-16

compliance … 2-18 non-U.S.2-17

remediation … 1-42, 1-50 remote access … 1-44, 2-32

administrative control as a factor … 3-45 administrative workload as a factor … 3-44 endpoint capabilities as a factor … 3-45 network infrastructure as a factor … 3-47 risk assessment for … 3-40

selecting options for … 3-36, 3-38

user sophistication as a factor for … 3-42 weighing factors for … 3-48

Remote Procedure Call See RPC

risk tolerance … 2-15 assessing … 3-21 deployment methods … 3-53 quantifying … 2-18 regulations … 2-16 remote access … 3-40

rootkits … 2-21 routing 2-32 RPC 1-41, 2-37

See agentless testing RPs 1-11, 2-27 RSTP 1-52

S

Sarbanes-Oxley

See SOX security policies

finalizing … 3-106 IDM … 3-106

Windows browsers … 2-34 security policy, comprehensive … 3-5

components of … 3-6 security settings

macros … 2-38 OS-X2-37 Windows … 2-37

services

testing … 3-127 SIM 1-23

See EAP-SIM single-site

access control architecture … 3-84 smart card … 1-7

smart phone … 1-23 software tests … 2-38 SOX 1-10, 2-16

Spanning Tree Protocol … 1-52 spyware … 2-21

STP … 1-52 subnets … 2-32 subscriber identity module

See EAP-SIM switches

selecting for access control … 3-133, 3-137, 3-141

6 – Index

Page 302
Image 302
HP Access Control Client Software manual See SOX security policies