Security Solutions

2 – Index
agents
NAC EI … 1-41
permanent … 1-38, 1-40
SNMP … 1-41
transient … 1-39, 1-41
AH … 3-39
allow list … 1-20
applications
testing for compliance … 3-126
APs
selecting for access control … 3-136, 3-143
supplicants … 2-27
assessment
control over network … 2-39
endpoint integrity … 2-34
IT workload … 2-40
network size … 2-25
risk tolerance … 2-18
user cooperation … 2-40
vulnerability … 2-21
viruses and worms … 2-23
attack types
external … 2-19
internal … 2-19
malware … 2-20
wireless … 2-38
zero-day … 2-23
attack vectors … 2-19
authentication … 1-7
EAP … 1-46
methods … 1-16
protocols … 1-8, 1-23, 1-52
requirements … 1-23
server … 1-17, 1-19, 1-21
two factor … 1-8
authentication, authorization, and accounting
See AAA
authorization … 1-8
B
biometrics, as an authentication method … 1-8
C
CBC-MAC
See CCMP
CCMP … 1-32
certificate … 1-23
Challenge Handshake Authentication Protocol
(CHAP) … 1-24
Check-up
See endpoint integrity, posture
cluster, NAC 800
CS … 1-45, 1-46
ES … 1-52, 1-55
MS … 1-45, 1-46
role in authentication process … 1-48
settings … 3-63
connection types
remote access … 2-10
wired … 2-9
wireless … 2-9
core resources
laying out … 3-129
credentials
agentless testing … 3-63
login … 1-19
D
deployment methods
802.1X … 1-46
connection type as a factor … 3-56
DHCP … 1-48
inline … 1-51
network infrastructure as a factor … 3-55
options by access control method … 3-53
risk tolerance as a factor … 3-53
selecting … 3-51
DHCP … 1-17, 2-32
request … 1-49
DHCP deployment method … 1-43, 1-48
helper address … 1-48
multinetting … 1-50
quarantining … 1-48, 1-49
selecting … 3-51
digital certificate … 1-23
directory service … 2-31
DNS … 1-19, 1-47
domain
agentless testing … 3-63
domain name service
See DNS
Dynamic Host Configuration Protocol
See DHCP