User guide

Odyssey Access Client User Guide
6 Understanding Network Security
If an endpoint does not comply with an organization’s security policies, the Infranet
Controller can isolate the endpoint to a restricted (quarantine) network. The
quarantine network might provide access to limited network resources, such as a
file server, but prevent the endpoint from connecting to (and possibly infecting) the
rest of the organization’s network.
Remediation is the process of bringing an endpoint into compliance with an
organization’s security policies. The remediation process brings the endpoint into
compliance by sending remediation instructions to the endpoint. In most cases,
remediation happens automatically in the background.
When a quarantined endpoint complies with the security policies of the protected
network, the Infranet Controller redirects it to the protected network automatically.
Note that remediation does not necessarily require quarantine. Some
administrators choose to allow most or all endpoints onto the protected network
while performing automatic remediation on those endpoints.
Understanding Network Security
To understand OAC and network authentication, it is useful to understand basic
networking and security concepts. Appendix A, “Network Security Concepts,”
describes the networking choices that you can make and how those choices allow
you to use OAC to maximize the security of your connections over any wireless or
wired network.