Security Solutions

Index – 7
T
TACACS+ … 1-6
telephones … 2-30
testing
access control … 1-37
administrative control as a factor … 3-69
administrative workload as a factor … 3-74
agentless … 1-40, 1-41
endpoint … 1-42
medium endpoint integrity … 3-123
minimal endpoint integrity … 3-122
network overhead … 3-75
post-connect … 1-37, 3-71
pre-connect … 1-37
requirements
ActiveX … 3-62
agentless … 3-64
NAC EI agent … 3-61
rigorous endpoint integrity … 3-123
See also testing methods
selecting … 3-124
selection factors for methods … 3-69
transparent … 3-65
user interaction … 3-67
user sophistication as a factor … 3-72
Web browsers … 3-124
testing methods … 1-38
ActiveX … 3-62
agentless … 2-37, 3-63
enabling … 3-64
NAC EI agent … 3-60
operation of, on NAC 800 … 3-65
selecting … 3-59
TKIP … 1-32
TLS
See EAP-TLS
token card … 1-7
transport level security
See EAP-TLS
Trojan horses … 2-21
TTLS
See EAP-TTLS
tunneled TLS
See EAP-TTLS
U
Unknown
See endpoint integrity, posture
user sophistication
access control methods … 3-22
remote access … 3-42
testing methods … 3-72
user types
employees … 2-5
guests … 2-6
temporary … 2-6
users
sophistication level … 2-7
V
Virus Throttle software, ProCurve … 2-23
viruses … 2-22
VLANs … 1-9, 1-17, 1-20, 1-22, 1-33, 1-53, 2-32
assignment … 3-108, 3-132, 3-136, 3-141, 3-143
dynamic … 1-33, 3-109
quarantine … 1-35, 1-43, 1-47, 1-54
quarantine subnet … 1-50
voice over IP (VoIP) … 1-17, 2-30
VPN … 1-44, 2-32
client
selecting … 3-144
encryption … 3-144
gateway
selecting … 3-144
options for … 3-39
protocol … 3-144
selecting options for … 3-36, 3-38
W
WANs … 1-44
Web browser
tests … 3-124
Web-Auth … 1-19, 2-27, 3-19
advantages of … 3-13
disadvantages of … 3-13
endpoint integrity and … 3-51