T

TACACS+ … 1-6 telephones … 2-30 testing

access control … 1-37

administrative control as a factor … 3-69 administrative workload as a factor … 3-74 agentless … 1-40, 1-41

endpoint … 1-42

medium endpoint integrity … 3-123 minimal endpoint integrity … 3-122 network overhead … 3-75 post-connect1-37, 3-71 pre-connect1-37 requirements

ActiveX … 3-62 agentless … 3-64 NAC EI agent … 3-61

rigorous endpoint integrity … 3-123 See also testing methods selecting … 3-124

selection factors for methods … 3-69 transparent … 3-65

user interaction … 3-67

user sophistication as a factor … 3-72 Web browsers … 3-124

testing methods … 1-38 ActiveX … 3-62 agentless … 2-37, 3-63 enabling … 3-64 NAC EI agent … 3-60

operation of, on NAC 800 … 3-65 selecting … 3-59

TKIP … 1-32

TLS

See EAP-TLS token card … 1-7 transport level security

See EAP-TLS Trojan horses … 2-21

TTLS

See EAP-TTLS tunneled TLS

See EAP-TTLS

U

Unknown

See endpoint integrity, posture user sophistication

access control methods … 3-22 remote access … 3-42 testing methods … 3-72

user types employees … 2-5 guests … 2-6 temporary … 2-6

users

sophistication level … 2-7

V

Virus Throttle software, ProCurve … 2-23 viruses … 2-22

VLANs … 1-9, 1-17, 1-20, 1-22, 1-33, 1-53, 2-32 assignment … 3-108, 3-132, 3-136, 3-141, 3-143 dynamic … 1-33, 3-109

quarantine … 1-35, 1-43, 1-47, 1-54 quarantine subnet … 1-50

voice over IP (VoIP) … 1-17, 2-30 VPN … 1-44, 2-32

client

selecting … 3-144 encryption … 3-144 gateway

selecting … 3-144 options for … 3-39 protocol … 3-144

selecting options for … 3-36, 3-38

W

WANs … 1-44 Web browser

tests … 3-124 Web-Auth1-19, 2-27, 3-19

advantages of … 3-13 disadvantages of … 3-13 endpoint integrity and … 3-51

Index – 7

Page 303
Image 303
HP Access Control Client Software manual Tls