Great Bay Beacon Extreme Sentriant AG RADIUS router (proxy) Network Enforcement Point Switches Cisco Enterasys Extreme HP APs Introduction to NAC Switches.

Slides:



Advertisements
Similar presentations
Customer Insight: CSO's Perspective – What Edge? Microsoft Research EdgeNet, June 2006 Mark Ashida General Manager Windows Enterprise Networking.
Advertisements

5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Network Asset Management at Jefferson Lab Bryan Hess, Andy Kowalski, Brent Morris,
Network Security In Education A Balancing Act Doug Klein CTO Vernier Networks, Inc.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Interop Labs Network Access Control
Interop Labs Network Access Control Interop Las Vegas 2006 Karen O’Donoghue.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
InteropLabs Network Access Control Interop Las Vegas 2008 Robert Nagy Accuvant Inc Principal Security Consultant
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Agenda Academic Issues Perimeter & Internal Security
Networking Components
Network Access Control “an approach to computer network security that attempts to unify endpoint security.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
Firewall and Proxy Server Director: Dr. Mort Anvari Name: Anan Chen Date: Summer 2000.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Luc Billot Security Consulting Engineer
Andrew Fuqua 3/4/2015 LTEC A network HUB is a device that is used to link multiple devices over a network. The HUB is not a great choice when shopping.
CHAPTER Introduction to LANs. MODULE Purpose and Use of a Network.
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
CISCO NETWORKING ACADEMY Chabot College ELEC Router Introduction.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
Using RADIUS Within the Framework of the School Environment Ed Register Consultant April 6, 2011.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Networking Components
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Enabling Authentication & Network Admission Control Steve Pettit.
Virtual Company Group 8 Presentation Date: June /04/2017
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
Copyright © 2005 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Open Standards for Network Access Control Trusted Network Connect.
EID Cards and “Identity Based Networking Services” Because “Networks” are an integral part of the total solution. Walter Gillis Account Manager, for Flemish.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
Network Access Control for Education
Altai Certification Training Backend Network Planning
70-411: Administering Windows Server 2012
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
20411B 8: Installing, Configuring, and Troubleshooting the Network Policy Server Role Presentation: 60 minutes Lab: 60 minutes After completing this module,
Module 8: Configuring Network Access Protection
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Resnet Enhancements and Directions Part 1, Bruce Campbell, Information Systems and Technology.
Configuring Network Access Protection
NAC-NAP Interoperability
Exam 2 Review INFS 6301 Fall Exam Information  Chapters 7 – 11 & 15 and online content  Structure  50 multiple choice (1.5 points each / 75 points.
7.4 Update - ISE Session.
Windows ® Azure ™ Platform. Network Architecture Packet Filtering Built-In Firewalls Connect Service SSL WCF Security Agenda.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Networking Components Assignment 3 Corbin Watkins.
Price range varies from $17.99 to $34.99 or more. Device 1 Device 2 Network Connection.
So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015.
1/117 Switch internals Floor SwitchCore Switch L3 Default NSNA port VLAN L2 Filter NSNA default VLANs access Filter per VLAN DHCP Relay Agent DHCP Relay.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
أمن المعلومات لـ أ. عبدالرحمن محجوب حمد mtc.edu.sd أمن المعلومات Information Security أمن المعلومات Information Security  أ. عبدالرحمن محجوب  Lec (5)
Implementing Network-Edge Security with 802.1x
Implementing Network Access Protection
Forefront Security ISA
Network Access Control
Cisco Real Exam Dumps IT-Dumps
Network Access Control
CHAPTER Introduction to LANs
Intel Active Management Technology
Network Access Control
A Glimpse Into a Few Current Tech Projects
NAP / PWG Discussion August 17, 2009.
Presentation transcript:

Great Bay Beacon Extreme Sentriant AG RADIUS router (proxy) Network Enforcement Point Switches Cisco Enterasys Extreme HP APs Introduction to NAC Switches and APs with full framework capability doing VLAN assignment Cisco Enterasys Extreme HP Trapeze APs Enforcement Spectrum Guest Contractor Production Quarantine VLANs Enforcement by: VLAN ACL / Filter QOS Auth by 802.1X Network Enforcement Point Juniper firewall Data center Cross-VLAN Firewall Packet Filters Gigamon net monitor Juniper IDP Cisco Extreme HP Trapeze posture EAP/RADIUS Network behavior info Extreme Sentriant NG sensor Port Monitor User authentication Device authentication Active Directory phones printers badge readers Switches Network Access Control Las Vegas 2007 Port Monitor Device database User database Posture Validators Cisco ACS Server Broker & Network Access Authority Trend Micro LANDesk Cisco CSA internal EAP- FAST Posture Validators Juniper UAC Q1 Wave Systems PatchLinkinternal Server Broker & Network Access Authority EAP- JEAP Posture Validators ID Engines Ignition internal Server Broker & Network Access Authority EAP- PEAP Posture Validators OSC Radiator internal Server Broker & Network Access Authority EAP- TTLS Posture Validators Microsoft NPS Trend Micro internal Server Broker & Network Access Authority EAP- PEAP Edge Enforcement Non-Edge Enforcement Old switches and hubs Cisco CCA Juniper ScreenOS Internet Captive Portals Cisco Enterasys Extreme HP LDAP Cisco CCA non-NAC clients WildPackets analyzer Devices Spectrum Non 802.1X Clients Linksys Network Attached Storage Pingtel Phone Posture Collectors Client Broker & Network Access Requestor Cisco NAC-Capable Client Trend Micro LANDesk Cisco CSA Cisco CTA Posture Collectors Client Broker & Network Access Requestor TCG TNC-Capable Client PatchLinkWave Systems Juniper UAC Posture Collectors Client Broker & Network Access Requestor Microsoft NAP-Capable Client Trend Micro Microsoft System Health Agent 802.1X Clients without Posture Collectors Windows Unix Mac HP Printer 802.1X/TLS Axis Camera 802.1X/TLS NAC-capable switches DHCP info Lockdown Proxy Access Requestor

Posture Collector Client Broker & Network Access Requestor Cisco Network Admission Control Trend Micro LANDesk Cisco CSA Cisco CTA Posture Collector Client Broker & Network Access Requestor Microsoft Network Access Protection Trend Micro Microsoft System Health Agent Non 802.1X Clients Linksys Network Attached Storage Pingtel Phone 802.1X Clients without Posture Collectors Windows Linux Mac HP Printer 802.1X/TLS Axis Camera 802.1X/TLS Posture Validators Juniper UAC Q1 Wave Systems PatchLinkinternal Server Broker & Network Access Authority EAP- JEAP Client Broker & Network Access Requestor Cisco NAC-capable Client Trend Micro LANDesk Cisco CSA Cisco CTA Kevin’s idea Posture Collector Client Broker & Network Access Requestor TCG Trusted Network Connect PatchLinkWave Systems Client Broker & Network Access Requestor TCG Trusted Network Connect PatchLinkWave Systems Joel’s idea Posture Collectors Juniper UAC Jan adds to Joel’s idea Client Broker & Network Access Requestor TCG Trusted Network Connect PatchLinkWave Systems Posture Collectors Juniper UAC Client Broker & Network Access Requestor TCG Trusted Network Connect PatchLinkWave Systems Posture Collectors Juniper UAC Posture Collector Client Broker & Network Access Requestor Cisco Trust Agent (Windows) LAN- Desk Info- Express What we did last year: Posture Validators Juniper UAC Q1 Wave Systems PatchLinkinternal Server Broker & Network Access Authority EAP- JEAP Joel’s idea What we have Posture Validators Q1 Wave Systems PatchLink Server Broker & Network Access Authority EAP- JEAP Cisco ACS internal Client Broker & Network Access Requestor Trend Micro LANDesk Cisco CSA Cisco CTA Jan’s idea #3 Posture Collectors Cisco NAC-capable Client EAP- FAST Client Broker & Network Access Requestor Cisco NAC-capable Client Trend Micro LANDesk Cisco CSA Cisco CTA Kevin’s idea #2 Posture Collectors EAP FAST Kevin’s idea #2 Posture Validators Q1 Wave Systems PatchLinkinternal Server Broker & Network Access Authority EAP- JEAP Cisco ACS Jan’s idea #3 Client Broker & Network Access Requestor Trend Micro LANDesk Cisco CSA Cisco CTA Jan’s idea #4 Posture Collectors Cisco NAC-capable Client EAP- FAST Posture Validators Juniper UAC Q1 Wave Systems PatchLinkinternal Server Broker & Network Access Authority EAP- JEAP font color