Cisco Network Admission Control, Volume II NAC Framework Deployment and Troubleshooting

by ; ;
Edition: 1st
Format: Paperback
Pub. Date: 2006-11-21
Publisher(s): Cisco Press
Availability: This title is currently not available.
List Price: $69.55

Rent Book

Select for Price
There was a problem. Please try again later.

New Book

We're Sorry
Sold Out

Used Book

We're Sorry
Sold Out

eBook

We're Sorry
Not Available

Summary

Secure the network edge with the premier book on NAC deployment and management The first book on deploying and managing the Cisco NAC solution Addresses the security risks of remote and mobile computer users connecting to corporate networks Enables end-point products (i.e. PCs, servers, and PDAs) to communicate security information, allowing networks to restrict access of non-compliant devices to the rest of the network Network Admission Control (NAC), a set of technologies and solutions built on an industry initiative led by Cisco, uses the network infrastructure to enforce security policy compliance on all devices seeking to access network computing resources, thereby limiting damage from emerging security threats. Customers using NAC can allow network access only to compliant and trusted end-point devices (PCs, servers, and PDAs, for example) and can restrict the access of noncompliant devices. The purpose ofCisco Network Admission Control Volume II is to provide a comprehensive guide on how to deploy and troubleshoot phase 2 of NAC to protect networks from attacks and threats and to ultimately create a self-defending network. By highlighting what protection NAC provides when a virus outbreak occurs, this book is a guide for any network professional who manages network security and monitors organizational infrastructure for day-zero threats.

Author Biography

Jazib Frahim, CCIE No. 5459, has been with Cisco Systems for more than seven years. With a Bachelor’s degree in computer engineering from Illinois Institute of Technology, he started out as a TAC engineer with the LAN Switching team. He then moved to the TAC Security team, where he acted as a technical leader for the security products. He led a team of 20 engineers as a team leader in resolving complicated security and VPN technologies. Jazib is currently working as a Senior Network Security Engineer in the Worldwide Security Services Practice of Cisco’s Advanced Services for Network Security. He is responsible for guiding customers in the design and implementation of their networks, with a focus in network security. He holds two CCIEs, one in Routing and Switching and the other in Security. He also authored the Cisco Press book Cisco ASA: All-in-one Firewall, IPS, and VPN Adaptive Security Appliance(ISBN: 1-58705-209-1). Additionally, Jazib has written numerous Cisco online technical documents and has been an active member on Cisco’s online forum, NetPro. He has presented at Networkers on multiple occasions and has taught many onsite and online courses to Cisco customers, partners, and employees.

Jazib is currently pursuing a Master of Business Administration (MBA) degree from North Carolina State University.

 

Omar Santos is a Senior Network Security Consulting Engineer in the Worldwide Security Services Practice of Cisco’s Advanced Services for Network Security. He has more than 12 years of experience in secure data communications. Omar has designed, implemented, and supported numerous secure networks for Fortune 500 companies and the U.S. government, including the United States Marine Corps (USMC) and Department of Defense (DoD). He is also the author of the Cisco Press book Cisco ASA: All-in-one Firewall, IPS, and VPN Adaptive Security Appliance(ISBN: 1-58705-209-1) and many Cisco online technical documents and configuration guidelines. Prior to his current role, he was a technical leader of Cisco’s Technical Assistance Center (TAC), where he taught, led, and mentored many engineers within the organization. He is an active member of the InfraGard organization, a cooperative undertaking between the Federal Bureau of Investigation and an association of businesses, academic institutions, state and local law-enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructures of the United States of America. Omar has also delivered numerous technical presentations to Cisco customers, partners, and other organizations.

 

David White, Jr., CCIE No. 12021, has more than ten years of networking experience with a focus on network security. He is currently an Escalation Engineer in the Cisco TAC, where he has been for more than six years. In his role at Cisco, he is involved in new product design and implementation and is an active participant in Cisco documentation, both online and in print. David holds a CCIE in Security and is also NSA IAM certified. Before joining Cisco, David worked for the U.S. government, where he helped secure its worldwide communications network. He was born and raised in St. Petersburg, Florida, and received his Bachelor’s degree in computer engineering from the Georgia Institute of Technology.

 

Table of Contents

Introduction
NAC Overview
NAC Solution and Technology Overview
Network Admission Control
NAC: Phase I
NAC: Phase II
NAC Program Participants
Components That Make Up the NAC Framework Solution
Cisco Trust Agent
Cisco Security Agent
Network-Access Devices
Cisco VPN 3000 Series
Concentrator Cisco Secure
Access Control Server Event
Monitoring, Analysis, and Reporting
Summary
Review Questions
Configuration Guidelines
Cisco Trust Agent
Preparing for Deployment of CTA Supported Operating Systems
Deploying CTA in a Lab Environment CTA Windows
Installation CTA Windows
Installation with the 802.1X Wired Supplicant
CTA Mac Installation
CTA Linux Installation
Installing the CA Certificate User Notifications
Customizing CTA with the Optional ctad.ini File [main]
Section [EAPoUDP]
Section [UserNotifies]
Section [ServerCertDNVerification]
Distinguished Name-Matching
Section [Scripting_Interface]
Section Example ctad.ini
CTA Scripting Interface
Requirements for Using the Scripting Interface
Executing the Scripting Interface
CTA Logging Service
Creating a ctalogd.ini File Using the clogcli Utility
Deploying CTA in a Production Network
Deploying CTA on Windows
Deploying CTA on Mac OS X
Deploying CTA on Linux
Troubleshooting CTA
Installation Issues
Communication Issues
System Logs
CTA Client Fails to Receive a Posture Token
CTA 802.1X Wired Client
Client Is Disconnected (Suspended)
Chapter Summary
References
Review Question
Cisco Secure Services
Client Installing and Configuring the Cisco Secure Services
Client Minimum System Requirements
Installing the Cisco Secure Services
Administrative Client
Configuring the Cisco Secure Services
Administrative Client
Deploying the Cisco Secure Services
Client in a Production Network
End-User Client Deployment
Installation Prerequisite
Creating End-User Client-Configuration Files
Creating the License File
Deploying the End-User Client
Viewing the Current Status of the Cisco Secure Services
Client Windows
Wireless Zero Configuration
Troubleshooting the Cisco Secure Services
Client System Report Utility
Viewing the Client Logs and Connection Status in Real Time
Client Icon Does Not Appear in System Tray
Client GUI Does Not Start
Client Does Not Prompt for Password
Wireless Client Is Immediately Dissociated after 802.1X
Authentication Client Is Disconnected (Suspended)
Summary
References
Review Question
Configuring Layer 2
NAC on Network Access Devices NAC-L2-IP
Architecture of NAC-L2-IP
Configuring NAC-L2-IP
Troubleshooting NAC-L2-IP NAC-L2-802.1X
Architecture of NAC-L2-802.1X
Configuring NAC-L2-802.1X
MAC Authentication
Bypass Troubleshooting NAC-L2-802.1X
Configuring NAC-L2-802.1X on Cisco Wireless Access Points
Summary
Review Questions
Configuring Layer 3
NAC on Network Access Devices
Architectural Overview of NAC on Layer 3 Devices
Configuration Steps of NAC on Layer 3 Devices
Configuring AAA Authentication
Defining the RADIUS Server
Specifying the Interface Access Control List
Configuring the NAC Parameters
Defining the NAC I
Table of Contents provided by Publisher. All Rights Reserved.

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.