Cisco Network Admission Control, Volume II

Cisco Network Admission Control, Volume II : Nac Framework Deployment and Troubleshooting

4.33 (3 ratings by Goodreads)
By (author)  , By (author)  , By (author) 

List price: US$48.00

Currently unavailable

We can notify you when this item is back in stock

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

<p>When most information security professionals think about threats to their networks, they think about the threat of attackers from the outside. However, in recent years the number of computer security incidents occurring from trusted users within a company has equaled those occurring from external threats. The difference is, external threats are fairly well understood and almost all companies utilize tools and technology to protect against those threats. In contrast, the threats from internal trusted employees or partners are often overlooked and much more difficult to protect against. </p><p>Network Admission Control (NAC) is designed to prohibit or restrict access to the secured internal network from devices with a diminished security posture until they are patched or updated to meet the minimum corporate security requirements. A fundamental component of the Cisco Self-Defending Network Initiative, NAC enables you to enforce host patch policies and to regulate network access permissions for noncompliant, vulnerable systems.</p><p>Cisco Network Admission Control, Volume II, helps you understand how to deploy the NAC Framework solution and ultimately build a self-defending network. The book focuses on the key components that make up the NAC Framework, showing how you can successfully deploy and troubleshoot each component and the overall solution. Emphasis is placed on real-world deployment scenarios, and the book walks you step by step through individual component configurations. Along the way, the authors call out best practices and tell you which mistakes to avoid. Component-level and solution-level troubleshooting techniques are also presented. Three full-deployment scenarios walk you through application of NAC in a small business, medium-sized organization, and large enterprise.</p><ul type=disc> <li>Effectively deploy the Cisco Trust Agent </li> <li>Configure Layer 2 IP and Layer 2802.1x NAC on network access devices </li> <li>Examine packet flow in a Cisco IOS NAD when NAC is enabled, and configure Layer 3 NAC on the NAD </li> <li>Monitor remote access VPN tunnels </li> <li>Configure and troubleshoot NAC on the Cisco ASA and PIX security appliances </li> <li>Install and configure Cisco Secure Access Control Server (ACS) for NAC </li> <li>Install the Cisco Security Agent Manage-ment Center and create agent kits </li> <li>Add antivirus policy servers to ACS for external antivirus posture validation </li> <li>Understand and apply audit servers to your NAC solution </li> <li>Use remediation servers to automatically patch end hosts to bring them in compliance with your network policies </li> <li>Monitor the NAC solution using the Cisco Security Monitoring, Analysis, and Response System (MARS)</li></ul><p>This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.</p>show more

Product details

  • Electronic book text
  • Cisco Press
  • United States
  • English
  • 1587054035
  • 9781587054037

Rating details

3 ratings
4.33 out of 5 stars
5 33% (1)
4 67% (2)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X