Авторизация
Поиск по указателям
Frahim J., White D., Santos O. — Cisco Network Admission Control, Volume II: Deployment and Troubleshooting
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: Cisco Network Admission Control, Volume II: Deployment and Troubleshooting
Авторы: Frahim J., White D., Santos O.
Аннотация: Secure the network edge with the premier book on NAC deployment and management
* The first book on deploying and managing the Cisco NAC solution
* Addresses the security risks of remote and mobile computer users connecting to corporate networks
* Enables end-point products (i.e. PCs, servers, and PDAs) to communicate security information, allowing networks to restrict access of non-compliant devices to the rest of the network
Network Admission Control (NAC), a set of technologies and solutions built on an industry initiative led by Cisco, uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources, thereby limiting damage from emerging security threats. Customers using NAC can allow network access only to compliant and trusted end-point devices (PCs, servers, and PDAs, for example) and can restrict the access of noncompliant devices. The purpose of Cisco Network Admission Control Volume II is to provide a comprehensive guide on how to deploy and troubleshoot phase 2 of NAC to protect networks from attacks and threats and to ultimately create a self-defending network. By highlighting what protection NAC provides when a virus outbreak occurs, this book is a guide for any network professional who manages network security and monitors organizational infrastructure for day-zero threats.
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2006
Количество страниц: 624
Добавлена в каталог: 11.12.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
Small business, configuring NAC, web server 411
Small business, NAC requirements 395—397
Small business, network topology 397—398
Small business, troubleshooting NAC deployment 411
Small business, troubleshooting NAC deployment, ACS logging 413—414
Small business, troubleshooting NAC deployment, certificate issues 414—415
Small business, troubleshooting NAC deployment, EAP over UDP logging 413
Small business, troubleshooting NAC deployment, show commands 411—412
Software clients, VPN 3000 series concentrators 176—178
Software, provisioning to client machines 488—489
Stateful failovers, security appliances 211
Status query timers 200 226
Status, Cisco Secure Services 113—114
Sullivan, Chad, Cisco Security Agent 324
Switches, catalyst switches 17—20
Switches, large enterprise NAC configuration 472
Switches, report to CS-MARS setup 504
Switches, report to CS-MARS setup, defining as reporting device 505—507
Switches, report to CS-MARS setup, forward events configuration 508—509
Switches, small business configuration 406—410
Symantec, supported antivirus vendors 343
System Report Utility, troubleshooting Cisco Secure Services Client 115—117
System requirements, ACS installation 242—243
System requirements, CTA (Cisco Trust Agent) 32
Technical support, best practices 492—493
Testing, NAC deployment phase, planning 485
Testing, security appliance 229
Testing, security appliance, NAC session monitoring 235—238
Testing, security appliance, remote-access IPSec tunnel from agentless client 232—234
Testing, security appliance, remote-access IPSec tunnel from CTA client 234—235
Testing, security appliance, remote-access IPSec tunnel without NAC 230—232
Testing, VPN 3000 series concentrators 200
Testing, VPN 3000 series concentrators, remote-access IPSec tunnel from agentless client 203—205
Testing, VPN 3000 series concentrators, remote-access IPSec tunnel from CTA client 205—207
Testing, VPN 3000 series concentrators, remote-access IPSec tunnel without NAC 200—203
Third-party software, maintaining policies 492
Top Hosts (Total View) reports 531
Top hosts reports, CS-MARS 531
Top Tokens (Total View) reports 530
Top tokens reports, CS-MARs 530
Topology, large enterprises, branch office 454—456
Topology, large enterprises, headquarters 457—463
Topology, large enterprises, regional office 456
Traffic filtering, security appliance configuration 221
Training, best practices 493
Training, end-user 493—494
Training, engineering staff 494
Training, help desk staff 494
Trend Micro Policy Server, medium enterprise configuration 434
Trend Micro Policy Server, supported antivirus vendors 343
Troubleshooting, ACS, certificate issues 318
Troubleshooting, ACS, enabling service debug logging 314—317
Troubleshooting, ACS, invalid protocol data 317
Troubleshooting, ACS, RADIUS dictionary missing 318
Troubleshooting, ACS, RADIUS posture validation incorrect mapping 318
Troubleshooting, Cisco Secure Services, disassociated wireless client 119
Troubleshooting, Cisco Secure Services, GUI does not start 118
Troubleshooting, Cisco Secure Services, icon in system tray 118
Troubleshooting, Cisco Secure Services, password prompt 119
Troubleshooting, Cisco Secure Services, suspended client 119
Troubleshooting, Cisco Secure Services, System Report Utility 115—117
Troubleshooting, Cisco Secure Services, viewing client log 117
Troubleshooting, CS-MARS, monitored device discovery 537
Troubleshooting, CS-MARS, specific device events not showing 535—536
Troubleshooting, CS-MARS, unknown reporting device events showing 536—537
Troubleshooting, CTA (Cisco Trust Agent), 802.1X wired client 82 85—86
Troubleshooting, CTA (Cisco Trust Agent), communication 78—79
Troubleshooting, CTA (Cisco Trust Agent), disconnected client 87
Troubleshooting, CTA (Cisco Trust Agent), installation 77—78
Troubleshooting, CTA (Cisco Trust Agent), posture token validation 81—82
Troubleshooting, CTA (Cisco Trust Agent), system logs 80—81
Troubleshooting, Large enterprise NAC, ACS logs 475
Troubleshooting, Large enterprise NAC, debug commands 474
Troubleshooting, Large enterprise NAC, show commands 473—474
Troubleshooting, Layer 3 NAC 170—171
Troubleshooting, Medium enterprises, NAC on Catalyst 6500 switch 444—446
Troubleshooting, Medium enterprises, NAC on VPN 3000 concentrator 446—448
Troubleshooting, Medium enterprises, secure ACS logging 448
Troubleshooting, NAC for small business 411
Troubleshooting, NAC for small business, ACS logging 413—414
Troubleshooting, NAC for small business, certificate issues 414—415
Troubleshooting, NAC for small business, EAP over UDP logging 413
Troubleshooting, NAC for small business, show commands 411—412
Troubleshooting, NAC-L2--802.1X 145—147
Troubleshooting, NAC-L2-IP, debug commands 137—139
Troubleshooting, NAC-L2-IP, EoU logging 136—137
Troubleshooting, NAC-L2-IP, show commands 133—136
Troubleshooting, Security appliances 229
Troubleshooting, Security appliances, NAC session monitoring 235—238
Troubleshooting, Security appliances, remote-access IPSec tunnel from agentless client 232—234
Troubleshooting, Security appliances, remote-access IPSec tunnel from CTA client 234—235
Troubleshooting, Security appliances, remote-access IPSec tunnel without NAC 230—232
Troubleshooting, VPN 3000 series concentrators 200
Troubleshooting, VPN 3000 series concentrators, remote-access IPSec tunnel from agentless client 203—205
Troubleshooting, VPN 3000 series concentrators, remote-access IPSec tunnel from CTA client 205—207
Troubleshooting, VPN 3000 series concentrators, remote-access IPSec tunnel without NAC 200—203
Trusted servers, configuring Administrative Client 101—102
Tuning, NAC deployment phase 486
Tunnels, security appliance configuration 216
Upgrades, ACS installation 246
User databases, ACS 305—306
User networks, medium enterprise NAC deployment 421
User notifications, CTA (Cisco Trust Agent) 48
Users, authentication, IPSec remote-access tunnels 183—185
Users, authentication, security appliance configuration 217
Users, NAC deployment phase 483
Users, training best practices 493—494
Vendor attributes, ACS 306
VirusScan 343
VLAN assignment, ACS posture enforcement 280—281
VLAN assignment, headquarter network topology 461—463
VPN 3000 series concentrators 175
VPN 3000 series concentrators, architecture 175
VPN 3000 series concentrators, architecture, L2TP over IPSec clients 179—180
VPN 3000 series concentrators, architecture, software clients 176—178
VPN 3000 series concentrators, configuration steps 181
VPN 3000 series concentrators, configuration steps, Cisco Easy VPN Client 189—192
VPN 3000 series concentrators, configuration steps, NAC-related parameters 193—200
VPN 3000 series concentrators, configuration steps, VPN configuration 182—189
VPN 3000 series concentrators, event sending to CS-MARS 521
VPN 3000 series concentrators, event sending to CS-MARS, defining as reporting device 521—522
VPN 3000 series concentrators, event sending to CS-MARS, forward event configuration 523—524
VPN 3000 series concentrators, medium enterprise configuration 430—431
VPN 3000 series concentrators, NADs (Network Access Devices) 20
VPN 3000 series concentrators, testing solutions 200
VPN 3000 series concentrators, testing solutions, remote-access IPSec tunnel from agentless client 203—205
VPN 3000 series concentrators, testing solutions, remote-access IPSec tunnel from CTA client 205—207
VPN 3000 series concentrators, testing solutions, remote-access IPSec tunnel without NAC 200—203
VPN, configuration, VPN 3000 concentrator 182—189
VPN, security appliance configuration 213—214 221
VPN, security appliance configuration, defining tunnel type 216
VPN, security appliance configuration, dynamic crypto map 220
VPN, security appliance configuration, enabling ISAKMP 214
VPN, security appliance configuration, IP address assignment 218—219
VPN, security appliance configuration, IPSec policy 219
VPN, security appliance configuration, ISAKMP preshared keys 217
VPN, security appliance configuration, remote-access attributes 214—216
VPN, security appliance configuration, traffic filtering 221
VPN, security appliance configuration, user authentication 217
Web servers, small business configuration 411
Web sites, Cisco 12
Windows Wireless Zero configuration (WZC) 115
Windows, ACS, installation 243—245
Windows, CTA (Cisco Trust Agent), 802.1X wired supplicant 35—42
Windows, CTA (Cisco Trust Agent), CA certificate 46—47
Windows, CTA (Cisco Trust Agent), installation packages 33
Windows, CTA (Cisco Trust Agent), lab environment installation 34—35
Windows, CTA (Cisco Trust Agent), operating system support 31
Windows, CTA (Cisco Trust Agent), production environment deployment 72—75
Wired supplicants, CTA Windows installation 5—42
Wireless clients, troubleshooting Cisco Secure Services 119
Wireless devices, NADs (Network Access Devices) 1—22
WZC (Windows Wireless Zero configuration), Cisco Secure Services 115
Реклама