Security Solutions

6 – Index
R
radio ports
See RPs
RADIUS … 1-6
RADIUS servers … 1-13, 1-46, 2-31
attribute-value pairs … 1-28
centralizing policies … 3-85
component combinations … 3-79
decision tree … 3-91
EAP method … 3-104
eliminating inter-site traffic … 3-87
endpoint integrity … 1-43
IAS … 1-13, 3-93
Juniper Steel-Belted … 1-13
messages … 1-28
NAC 800 … 1-13, 1-52, 3-94
no endpoint integrity … 3-79
number of, needed … 3-89
performance … 3-89
reducing inter-site traffic … 3-88
redundancy … 3-89
selecting … 3-78, 3-90
vendor-specific attributes … 1-29
wireless … 1-13
with endpoint integrity … 3-93
RADIUS-CHAP … 1-24, 1-30
RADIUS-PAP … 1-24, 1-30
Rapid Spanning Tree Protocol … 1-52
rate limits … 3-114
redundancy
RADIUS servers … 3-89
regulations … 2-16
compliance … 2-18
non-U.S. … 2-17
remediation … 1-42, 1-50
remote access … 1-44, 2-32
administrative control as a factor … 3-45
administrative workload as a factor … 3-44
endpoint capabilities as a factor … 3-45
network infrastructure as a factor … 3-47
risk assessment for … 3-40
selecting options for … 3-36, 3-38
user sophistication as a factor for … 3-42
weighing factors for … 3-48
Remote Procedure Call
See RPC
risk tolerance … 2-15
assessing … 3-21
deployment methods … 3-53
quantifying … 2-18
regulations … 2-16
remote access … 3-40
rootkits … 2-21
routing … 2-32
RPC … 1-41, 2-37
See agentless testing
RPs … 1-11, 2-27
RSTP … 1-52
S
Sarbanes-Oxley
See SOX
security policies
finalizing … 3-106
IDM … 3-106
Windows browsers … 2-34
security policy, comprehensive … 3-5
components of … 3-6
security settings
macros … 2-38
OS-X … 2-37
Windows … 2-37
services
testing … 3-127
SIM … 1-23
See EAP-SIM
single-site
access control architecture … 3-84
smart card … 1-7
smart phone … 1-23
software tests … 2-38
SOX … 1-10, 2-16
Spanning Tree Protocol … 1-52
spyware … 2-21
STP … 1-52
subnets … 2-32
subscriber identity module
See EAP-SIM
switches
selecting for access control 3-133, 3-137, 3-141