Security Solutions
Index – 3
E
EAP … 1-21, 1-25, 1-53
EAP-
GTC … 1-53
MD5 … 1-26
SIM … 1-17, 1-27
TLS … 1-26, 1-53
TTLS … 1-26
MD5 … 1-53
EAP message … 1-54
EAP method
802.1X supplicant support for … 3-103
and PKI … 3-102
decision tree … 3-101
RADIUS server … 3-104
selecting … 3-20, 3-101
EAP over LAN
See EAPOL
EAPOL … 1-25
edge devices … 2-25
EI
See endpoint integrity
encryption methods
WLANs … 3-17
endpoint integrity
assessment … 2-34
deployment methods
selecting … 3-51
implementing … 3-133, 3-135, 3-140, 3-143, 3-144
options by access control method … 3-53
posture … 1-42, 1-53
Check-up … 1-42, 1-47, 1-49, 1-56
Healthy … 1-42, 1-47, 1-49, 1-56
Infected … 1-42, 1-47, 1-49, 1-57
Quarantine … 1-47, 1-49, 1-57
Unknown … 1-42, 1-47, 1-54
quarantine methods … 1-42
requirements … 1-40
testing methods … 3-59
endpoints … 1-11, 2-28
access zones for … 3-131
administrative control over … 3-27, 3-45
assessing capabilities … 3-25, 3-45
ESP … 3-39
European Union (EU) … 2-17
F
Federal Information Security Management Act of
2000 (FISMA) … 2-17
G
Gramm-Leach-Bliley Act (GLBA) … 2-16
groups
policies for … 3-106
guest access … 3-132, 3-135
H
Health Insurance Portability and Accounting Act
See HIPAA
Healthy
See endpoint integrity, posture
helper address … 1-48
HIPAA … 2-16
hotfixes
testing for … 3-125
I
IAS … 1-13, 1-17, 1-46, 3-93
Identity Driven Manager (IDM) … 1-53, 1-56, 1-58,
2-31
access policy group rules … 3-115
access policy groups … 3-100
access profile … 3-107
agent for RADIUS servers … 3-99
allowed resources … 3-109
designing policies … 3-107
dynamic VLANs … 3-109
NAC 800 … 1-52
need for … 3-98
network design parameters … 3-99
QoS settings … 3-114
rate limits … 3-114
VLAN assignments … 3-108
IDS/IPS … 2-24
IKE … 3-38
IMSI … 1-27
Infected
See endpoint integrity, posture
infrastructure devices
802.1X supplicants … 3-31