Home Page Icon
Home Page
Table of Contents for
Dedication
Close
Dedication
by Daniel V. Hoffman
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Copyright
Dedication
About the Author
Credits
Acknowledgments
Introduction
An Ethical Hacker's Perspective
The Flow of This Book
What You'll Learn
Questions to Ask Yourself as You Read This Book
Understanding Terms and Technologies
Who Is the Trusted Computing Group?
Is There a Cisco NAC Alliance Program?
Understanding Clientless and Client-Based NAC
Pre-Admission NAC
Post-Admission NAC
Summary
The Technical Components of NAC Solutions
Analyzing the Security Posture
Setting Policy for Device Analysis
Communicating the Security Posture of the Device
Taking Action Based on the Security Posture
Remediating the Security Deficiency
The Reporting Mechanism
Summary
What Are You Trying to Protect?
LAN-Based NAC
Mobile NAC
Summary
Understanding the Need for LAN-Based NAC/NAP
The Security Reasons for LAN-Based NAC
Unintentional LAN-Based Threats
Real-World Example of an Unintentional Threat
Intentional LAN-Based Threats
Summary
What's the Primary Need?
Why Companies Look to Mobile NAC
Mobile NAC and Direct Attacks
Mobile NAC and the Wireless Threat
Mobile NAC and the Malware Threat
Summary
Understanding Cisco Clean Access
The Technical Components of Cisco Clean Access
The Purpose of Cisco Clean Access
Summary
Understanding Cisco Network Admission Control Framework
Deployment Scenarios and Topologies
The Technical Components of the Cisco NAC Framework
The Purpose of Cisco NAC
Summary
Understanding Fiberlink Mobile NAC
Deployment Scenarios and Topologies
The Technical Components of Fiberlink Mobile NAC
The Purpose of Fiberlink Mobile NAC
Summary
Understanding Microsoft NAP Solutions
Deployment Scenarios and Topologies
Microsoft 802.1x
The Technical Components of Microsoft NAP
The Purpose of Microsoft NAP
Summary
Understanding NAC and NAP in Other Products
NAC-Like Functionality in Non-NAC Technologies
NAC and NAP Solutions from Other Vendors
Case Studies and Additional Information
Cisco Clean Access
McAfee NAC
Bradford Networks
Bibliography
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Copyright
Next
Next Chapter
About the Author
Dedication
To Cheryl, Nathan and Noah ... the best is yet to come!
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset