Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Frahim J., White D., Santos O. — Cisco Network Admission Control, Volume II: Deployment and Troubleshooting
Frahim J., White D., Santos O. — Cisco Network Admission Control, Volume II: Deployment and Troubleshooting



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Cisco Network Admission Control, Volume II: Deployment and Troubleshooting

Авторы: Frahim J., White D., Santos O.

Аннотация:

Secure the network edge with the premier book on NAC deployment and management
* The first book on deploying and managing the Cisco NAC solution
* Addresses the security risks of remote and mobile computer users connecting to corporate networks
* Enables end-point products (i.e. PCs, servers, and PDAs) to communicate security information, allowing networks to restrict access of non-compliant devices to the rest of the network

Network Admission Control (NAC), a set of technologies and solutions built on an industry initiative led by Cisco, uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources, thereby limiting damage from emerging security threats. Customers using NAC can allow network access only to compliant and trusted end-point devices (PCs, servers, and PDAs, for example) and can restrict the access of noncompliant devices. The purpose of Cisco Network Admission Control Volume II is to provide a comprehensive guide on how to deploy and troubleshoot phase 2 of NAC to protect networks from attacks and threats and to ultimately create a self-defending network. By highlighting what protection NAC provides when a virus outbreak occurs, this book is a guide for any network professional who manages network security and monitors organizational infrastructure for day-zero threats.


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2006

Количество страниц: 624

Добавлена в каталог: 11.12.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Small business, configuring NAC, web server      411
Small business, NAC requirements      395—397
Small business, network topology      397—398
Small business, troubleshooting NAC deployment      411
Small business, troubleshooting NAC deployment, ACS logging      413—414
Small business, troubleshooting NAC deployment, certificate issues      414—415
Small business, troubleshooting NAC deployment, EAP over UDP logging      413
Small business, troubleshooting NAC deployment, show commands      411—412
Software clients, VPN 3000 series concentrators      176—178
Software, provisioning to client machines      488—489
Stateful failovers, security appliances      211
Status query timers      200 226
Status, Cisco Secure Services      113—114
Sullivan, Chad, Cisco Security Agent      324
Switches, catalyst switches      17—20
Switches, large enterprise NAC configuration      472
Switches, report to CS-MARS setup      504
Switches, report to CS-MARS setup, defining as reporting device      505—507
Switches, report to CS-MARS setup, forward events configuration      508—509
Switches, small business configuration      406—410
Symantec, supported antivirus vendors      343
System Report Utility, troubleshooting Cisco Secure Services Client      115—117
System requirements, ACS installation      242—243
System requirements, CTA (Cisco Trust Agent)      32
Technical support, best practices      492—493
Testing, NAC deployment phase, planning      485
Testing, security appliance      229
Testing, security appliance, NAC session monitoring      235—238
Testing, security appliance, remote-access IPSec tunnel from agentless client      232—234
Testing, security appliance, remote-access IPSec tunnel from CTA client      234—235
Testing, security appliance, remote-access IPSec tunnel without NAC      230—232
Testing, VPN 3000 series concentrators      200
Testing, VPN 3000 series concentrators, remote-access IPSec tunnel from agentless client      203—205
Testing, VPN 3000 series concentrators, remote-access IPSec tunnel from CTA client      205—207
Testing, VPN 3000 series concentrators, remote-access IPSec tunnel without NAC      200—203
Third-party software, maintaining policies      492
Top Hosts (Total View) reports      531
Top hosts reports, CS-MARS      531
Top Tokens (Total View) reports      530
Top tokens reports, CS-MARs      530
Topology, large enterprises, branch office      454—456
Topology, large enterprises, headquarters      457—463
Topology, large enterprises, regional office      456
Traffic filtering, security appliance configuration      221
Training, best practices      493
Training, end-user      493—494
Training, engineering staff      494
Training, help desk staff      494
Trend Micro Policy Server, medium enterprise configuration      434
Trend Micro Policy Server, supported antivirus vendors      343
Troubleshooting, ACS, certificate issues      318
Troubleshooting, ACS, enabling service debug logging      314—317
Troubleshooting, ACS, invalid protocol data      317
Troubleshooting, ACS, RADIUS dictionary missing      318
Troubleshooting, ACS, RADIUS posture validation incorrect mapping      318
Troubleshooting, Cisco Secure Services, disassociated wireless client      119
Troubleshooting, Cisco Secure Services, GUI does not start      118
Troubleshooting, Cisco Secure Services, icon in system tray      118
Troubleshooting, Cisco Secure Services, password prompt      119
Troubleshooting, Cisco Secure Services, suspended client      119
Troubleshooting, Cisco Secure Services, System Report Utility      115—117
Troubleshooting, Cisco Secure Services, viewing client log      117
Troubleshooting, CS-MARS, monitored device discovery      537
Troubleshooting, CS-MARS, specific device events not showing      535—536
Troubleshooting, CS-MARS, unknown reporting device events showing      536—537
Troubleshooting, CTA (Cisco Trust Agent), 802.1X wired client      82 85—86
Troubleshooting, CTA (Cisco Trust Agent), communication      78—79
Troubleshooting, CTA (Cisco Trust Agent), disconnected client      87
Troubleshooting, CTA (Cisco Trust Agent), installation      77—78
Troubleshooting, CTA (Cisco Trust Agent), posture token validation      81—82
Troubleshooting, CTA (Cisco Trust Agent), system logs      80—81
Troubleshooting, Large enterprise NAC, ACS logs      475
Troubleshooting, Large enterprise NAC, debug commands      474
Troubleshooting, Large enterprise NAC, show commands      473—474
Troubleshooting, Layer 3 NAC      170—171
Troubleshooting, Medium enterprises, NAC on Catalyst 6500 switch      444—446
Troubleshooting, Medium enterprises, NAC on VPN 3000 concentrator      446—448
Troubleshooting, Medium enterprises, secure ACS logging      448
Troubleshooting, NAC for small business      411
Troubleshooting, NAC for small business, ACS logging      413—414
Troubleshooting, NAC for small business, certificate issues      414—415
Troubleshooting, NAC for small business, EAP over UDP logging      413
Troubleshooting, NAC for small business, show commands      411—412
Troubleshooting, NAC-L2--802.1X      145—147
Troubleshooting, NAC-L2-IP, debug commands      137—139
Troubleshooting, NAC-L2-IP, EoU logging      136—137
Troubleshooting, NAC-L2-IP, show commands      133—136
Troubleshooting, Security appliances      229
Troubleshooting, Security appliances, NAC session monitoring      235—238
Troubleshooting, Security appliances, remote-access IPSec tunnel from agentless client      232—234
Troubleshooting, Security appliances, remote-access IPSec tunnel from CTA client      234—235
Troubleshooting, Security appliances, remote-access IPSec tunnel without NAC      230—232
Troubleshooting, VPN 3000 series concentrators      200
Troubleshooting, VPN 3000 series concentrators, remote-access IPSec tunnel from agentless client      203—205
Troubleshooting, VPN 3000 series concentrators, remote-access IPSec tunnel from CTA client      205—207
Troubleshooting, VPN 3000 series concentrators, remote-access IPSec tunnel without NAC      200—203
Trusted servers, configuring Administrative Client      101—102
Tuning, NAC deployment phase      486
Tunnels, security appliance configuration      216
Upgrades, ACS installation      246
User databases, ACS      305—306
User networks, medium enterprise NAC deployment      421
User notifications, CTA (Cisco Trust Agent)      48
Users, authentication, IPSec remote-access tunnels      183—185
Users, authentication, security appliance configuration      217
Users, NAC deployment phase      483
Users, training best practices      493—494
Vendor attributes, ACS      306
VirusScan      343
VLAN assignment, ACS posture enforcement      280—281
VLAN assignment, headquarter network topology      461—463
VPN 3000 series concentrators      175
VPN 3000 series concentrators, architecture      175
VPN 3000 series concentrators, architecture, L2TP over IPSec clients      179—180
VPN 3000 series concentrators, architecture, software clients      176—178
VPN 3000 series concentrators, configuration steps      181
VPN 3000 series concentrators, configuration steps, Cisco Easy VPN Client      189—192
VPN 3000 series concentrators, configuration steps, NAC-related parameters      193—200
VPN 3000 series concentrators, configuration steps, VPN configuration      182—189
VPN 3000 series concentrators, event sending to CS-MARS      521
VPN 3000 series concentrators, event sending to CS-MARS, defining as reporting device      521—522
VPN 3000 series concentrators, event sending to CS-MARS, forward event configuration      523—524
VPN 3000 series concentrators, medium enterprise configuration      430—431
VPN 3000 series concentrators, NADs (Network Access Devices)      20
VPN 3000 series concentrators, testing solutions      200
VPN 3000 series concentrators, testing solutions, remote-access IPSec tunnel from agentless client      203—205
VPN 3000 series concentrators, testing solutions, remote-access IPSec tunnel from CTA client      205—207
VPN 3000 series concentrators, testing solutions, remote-access IPSec tunnel without NAC      200—203
VPN, configuration, VPN 3000 concentrator      182—189
VPN, security appliance configuration      213—214 221
VPN, security appliance configuration, defining tunnel type      216
VPN, security appliance configuration, dynamic crypto map      220
VPN, security appliance configuration, enabling ISAKMP      214
VPN, security appliance configuration, IP address assignment      218—219
VPN, security appliance configuration, IPSec policy      219
VPN, security appliance configuration, ISAKMP preshared keys      217
VPN, security appliance configuration, remote-access attributes      214—216
VPN, security appliance configuration, traffic filtering      221
VPN, security appliance configuration, user authentication      217
Web servers, small business configuration      411
Web sites, Cisco      12
Windows Wireless Zero configuration (WZC)      115
Windows, ACS, installation      243—245
Windows, CTA (Cisco Trust Agent), 802.1X wired supplicant      35—42
Windows, CTA (Cisco Trust Agent), CA certificate      46—47
Windows, CTA (Cisco Trust Agent), installation packages      33
Windows, CTA (Cisco Trust Agent), lab environment installation      34—35
Windows, CTA (Cisco Trust Agent), operating system support      31
Windows, CTA (Cisco Trust Agent), production environment deployment      72—75
Wired supplicants, CTA Windows installation      5—42
Wireless clients, troubleshooting Cisco Secure Services      119
Wireless devices, NADs (Network Access Devices)      1—22
WZC (Windows Wireless Zero configuration), Cisco Secure Services      115
1 2 3 4
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте