Security Solutions
4 – Index
inline deployment method … 1-51
quarantining … 1-43, 1-52
selecting … 3-51
integrity posture
See endpoint integrity
International Mobile Subscriber Identity
See IMSI
Internet Authentication Service
See IAS
IPsec … 3-38
J
Juniper Steel-Belted RADIUS … 1-13
K
Ki … 1-27
L
L2TP … 3-38
Lightweight EAP (LEAP) … 1-26, 1-53
M
Mac
testing endpoints … 3-127
MAC-Auth … 1-16
advantages of … 3-13
AP implements … 1-31
AP support for … 2-27
disadvantages of … 3-13
endpoint integrity and … 3-52
process … 1-17
process illustrated … 1-18
WLANs … 3-19
macros
security settings … 2-38
testing … 3-125
malware … 2-21
MD5 … 1-26
Michael … 1-32
MS-CHAP … 1-25, 1-53
multinetting … 1-50
multi-site access control architecture
autonomous … 3-84
distributed AAA … 3-84
fully centralized … 3-84
fully distributed … 3-84
N
NAC 800
as PDP … 1-53
as RADIUS server … 1-13, 3-94
component combinations … 3-95
EI-only … 1-45
number of, needed … 3-96
RADIUS-only … 1-52
tests … 2-34
NAC EI agent
advantages and disadvantages … 3-59, 3-62
downloading … 3-60
requirements for testing … 3-61
See also agents
NAC policies
creating … 3-120, 3-121
groups … 3-120
NASs … 1-6, 1-12
network access control process … 1-15
Network Immunity Manager … 2-24
network infrastructure
deployment methods … 3-55
remote access … 3-47
network interface card … 1-16
network overhead
testing methods … 3-75
network security design
core segment … 3-129
implementing … 3-129
private wired zone … 3-140
private wireless zone … 3-142
public wired zone … 3-131
public wireless zone … 3-134
remote zone … 3-143
selecting APs … 3-136, 3-143
selecting switches … 3-133, 3-137, 3-141
NIC … 1-16