R

radio ports See RPs

RADIUS … 1-6

RADIUS servers … 1-13,1-46,2-31attribute-value pairs … 1-28 centralizing policies … 3-85 component combinations … 3-79 decision tree … 3-91

EAP method … 3-104

eliminating inter-site traffic … 3-87 endpoint integrity … 1-43

IAS … 1-13,3-93

Juniper Steel-Belted1-13 messages … 1-28

NAC 800 … 1-13,1-52,3-94 no endpoint integrity … 3-79 number of, needed … 3-89 performance … 3-89 reducing inter-site traffic … 3-88 redundancy … 3-89

selecting … 3-78,3-90vendor-specific attributes … 1-29 wireless … 1-13

with endpoint integrity … 3-93RADIUS-CHAP1-24,1-30RADIUS-PAP1-24,1-30

Rapid Spanning Tree Protocol … 1-52 rate limits … 3-114

redundancy

RADIUS servers … 3-89 regulations … 2-16

compliance … 2-18non-U.S.2-17

remediation … 1-42,1-50 remote access … 1-44,2-32

administrative control as a factor … 3-45 administrative workload as a factor … 3-44 endpoint capabilities as a factor … 3-45 network infrastructure as a factor … 3-47 risk assessment for … 3-40

selecting options for … 3-36,3-38

user sophistication as a factor for … 3-42 weighing factors for … 3-48

Remote Procedure Call See RPC

risk tolerance … 2-15 assessing … 3-21 deployment methods … 3-53 quantifying … 2-18 regulations … 2-16 remote access … 3-40

rootkits … 2-21 routing … 2-32 RPC … 1-41,2-37

See agentless testing RPs … 1-11,2-27 RSTP … 1-52

S

Sarbanes-Oxley

See SOX security policies

finalizing … 3-106 IDM … 3-106

Windows browsers … 2-34 security policy, comprehensive … 3-5

components of … 3-6security settings

macros … 2-38OS-X2-37 Windows … 2-37

services

testing … 3-127 SIM … 1-23

See EAP-SIM single-site

access control architecture … 3-84 smart card … 1-7

smart phone … 1-23 software tests … 2-38 SOX … 1-10,2-16

Spanning Tree Protocol … 1-52 spyware … 2-21

STP … 1-52 subnets … 2-32subscriber identity module

See EAP-SIM switches

selecting for access control … 3-133,3-137,3-141

6 – Index