Many
Manuals
search
Kategorien
Marken
Startseite
IBM
Hardware
Tivoli and Cisco
Bedienungsanleitung
Ibm Tivoli and Cisco Bedienungsanleitung Seite 2
Herunterladen
Teilen
Teilen
Zu meinen Handbüchern hinzufügen
Drucken
Seite
/
516
Inhaltsverzeichnis
LESEZEICHEN
Bewertet
.
/ 5. Basierend auf
Kundenbewertungen
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
1
2
3
4
5
6
7
...
515
516
Building a Network
1
Access Control Solution
1
IBM Tivoli and Cisco Systems
3
January 2007
3
Second Edition (January 2007)
4
“Notices” on page vii
4
Contents
5
Contents v
7
Trademarks
10
Network
11
Admission Control
11
Preface xi
13
Become a published author
14
Comments welcome
15
Summary of changes
17
Architecture
19
Business context
21
IBM Integrated
22
Cisco Self-Defending Network
23
Endpoint
23
Compliance & Remediation
23
1.7 Conclusion
28
Architecting the solution
31
2.1.1 Architecture overview
32
Network Admission Control
33
Security Compliance Manager
35
Tivoli Configuration Manager
37
Security policy
37
Compliance query
37
Compliance User Interface
38
Remediation handler
38
Quarantined
39
Cisco NAC and IEEE 802.1x
40
Using Cisco terminology
41
Posture agent
42
Network identity provisioning
42
Remediation process
43
Internet
45
2.3 Design process
46
Creation
49
Implementation
49
2.3.3 Solution objectives
50
Default network
51
Quarantine access
52
Trusted network
52
Performance controls
52
2.4 Implementation flow
53
2.6 Conclusion
55
Component structure
57
3.1 Logical components
58
Posture validation server
59
Figure 3-2 ACS architecture
60
Policy enforcement device
61
Admission control client
61
3.1.2 Compliance
64
Compliance client
66
Posture collector
67
3.1.3 Remediation
69
3.2 Physical components
70
Network access device
72
Network Access Profiles
76
Remediation (flow 4)
79
3.3.1 Secure communication
80
3.4 Component placement
81
Figure 3-8 Security zones
82
Controlled zone - intranet
84
Other networks
84
Branch office compliance
85
Campus internal enforcement
86
Branch Office Compliance
87
(Campus Ingress Enforcement)
87
SOHO Compliance
88
(PAT access protection)
88
Extranet compliance
89
Lab compliance
90
Data Center protection
91
3.5 Conclusion
92
Customer
93
Armando Banking Brothers
95
Corporation
95
4.1 Company profile
96
4.2 Current IT architecture
97
Uncontrolled zone - Internet
98
Controlled zone - DMZ
98
Controlled intranet
98
Production network
98
NAC Framework
98
NAC Appliance
100
Firewall
104
Project overview
106
4.4 Conclusion
109
Solution design
111
5.1 Business requirements
113
5.2 Functional requirements
114
Remediation
117
Production
117
Compliance
117
Security compliance criteria
118
Remediation services
118
5.3.1 Logical components
120
Enforcing compliance criteria
127
Posture token
128
Healthy indicates that the
132
Performing remediation
133
5.3.2 Physical components
134
Compliance subsystem
135
Access Control Server
136
NAC-enabled network device
138
Layer 2 devices
138
Layer 3 devices
138
Cisco Trust Agent
139
Remediation subsystem
140
Software Package Web Server
140
5.4 Conclusion
141
Figure 6-11, click Next
155
English and click Next
159
6.2.1 Posture collectors
171
6.2.2 Policy collector
172
Figure 6-34, click Next
177
Figure 6-37 Policies view
180
Rule operators
192
Rule results
193
Rule format
193
TCMCLI utility policy
207
6.3.1 Cisco Trust Agent
208
6. Click Next (Figure 6-66)
214
(Figure 6-71)
219
6.4 Conclusion
230
Network enforcement
231
Installing Cisco Secure ACS
233
Configuring logging
244
client
247
Figure 7-16 AAA clients
251
Figure 7-18 AAA Clients
253
Configuring RADIUS attributes
254
Configuring groups
255
Figure 7-21 Group Setup
256
Configuring users
257
Internal Database
258
Global authentication setup
259
(Figure 7-24 on page 241)
260
6. Click Submit + Restart
261
To do this:
262
Token (APT) of
268
Figure 7-33 on page 251
268
(Figure 7-33)
269
Figure 7-35
271
12.Click Done
271
27.Click Done (Figure 7-44)
280
Allow any Protocol
289
Grant access
290
NAC_IISSCN_Posture_Profile
292
Healthy PA message:
294
24.Click Submit
300
External User Database
301
Unknown user policy
301
Clientless user
301
Figure 7-64 Naming of ACL
303
7. Click Submit
304
Figure 7-66 Binding the ACL
305
Router#
321
7.2.1 Installing CCA Agent
322
The steps are:
325
(Figure 7-77)
327
Figure 7-82 Managed subnets
332
Configure default login page
333
Configuring a Switch Group
334
3. Click Add
335
Configuring a switch profile
337
Configuring Port Profile
338
Configuring SNMP receiver
341
Adding a managed switch
342
IP Address box, and a
343
Figure 7-94 Managed switch
344
Defining user roles
345
Creating traffic policies
347
Access to TCM
349
Creating local users
350
Configure Clean Access Agent
352
Figure 7-106 New rule
356
Validity
358
Figure 7-109 Requirements
359
26.Click Update
363
Discovered clients
364
Logging on as a client
365
Continue
367
7.3 Conclusion
372
8.2.1 Prerequisites
376
Figure 8-16 Welcome window
394
is False) and click Next
401
IISSCN Extension Pack2 for
404
8.3.1 Locating HTML
416
Base HTML
418
Posture item HTML
418
HTML pages example
419
Posture element HTML
420
The wfattribute tag
421
The field Tag
421
The remattribute tag
422
8.3.3 Debug attributes
424
Logging posture items
425
Logging the HTML search path
426
TCRNavScan workflow
436
TCRNavVirusDefUpdate
441
TCRNavSoftwareInstalled
443
TCRMSPatchesInstallWinXP
444
HotfixId
446
TCRZLSoftwareInstalled
450
TCRZLSoftwareRunning
452
TCRMessengerDisabled
453
8.5 Conclusion
455
Appendixes
457
Hints and tips
459
Deployment overview
460
Top-level sequence of events
462
Cisco NAC sequence of events
465
Fault isolation
466
SCM Push Client
468
Tools and tricks
469
Cisco IOS Software router
470
Cisco IOS Software switch
470
Cisco Secure ACS server
471
NAC Appliance details
473
In-band versus out-of-band
474
NAC Appliance integration
475
Integration design
476
NAC Appliance Agent
477
TSCMAgent.bat
478
NACApplianceCompliance.entry
478
Policy collector
478
Scheduler
479
System path
481
Scheduler.bat
481
NAC Appliance Manager
482
State mapping and scenarios
483
Conclusion
488
Executive summary
490
The benefit of NAC
490
NAC implementation options
492
The NAC Appliance
493
NAC Framework solution
494
Investment protection
494
The next steps
496
NAC technology
496
NAC Framework components
497
Additional material
499
Using the Web material
500
Related publications
501
Online resources
502
How to get IBM Redbooks
502
Help from IBM
503
Numerics
505
Kommentare zu diesen Handbüchern
Keine Kommentare
Publish
Verwandte Produkte und Handbücher für Hardware Ibm Tivoli and Cisco
Hardware Ibm SY27-0345-06 Bedienungsanleitung
(148 Seiten)
Hardware Ibm 19K4206PT1 Bedienungsanleitung
(10 Seiten)
Hardware Ibm 802.11g Wireless Broadband Router WRT-410 Bedienungsanleitung
(69 Seiten)
Hardware Ibm 22P6972 Bedienungsanleitung
(46 Seiten)
Hardware Ibm B50 Bedienungsanleitung
(198 Seiten)
Hardware Ibm WebSphere Adapters Bedienungsanleitung
(226 Seiten)
Hardware Ibm 22P6959 Bedienungsanleitung
(50 Seiten)
Hardware Ibm Ultra320 Bedienungsanleitung
(54 Seiten)
Hardware Ibm Data Capture Board CLC-CAPT-PCASM Bedienungsanleitung
(15 Seiten)
Hardware Ibm 09-0572-000 Bedienungsanleitung
(101 Seiten)
Hardware Ibm EP-8KTA Bedienungsanleitung
(73 Seiten)
Hardware Ibm THINKVISION MONITOR L150 Bedienungsanleitung
(35 Seiten)
Hardware Ibm 28L2234 Bedienungsanleitung
(66 Seiten)
Hardware Ibm TotalStorage LTO Ultrium T400F Bedienungsanleitung
(136 Seiten)
Hardware Ibm 71P7285 Bedienungsanleitung
(77 Seiten)
Hardware Ibm WebSphere Business Integration Adapter Bedienungsanleitung
(92 Seiten)
Hardware Ibm CFC2 Bedienungsanleitung
(154 Seiten)
Hardware Ibm 2292 Bedienungsanleitung
(230 Seiten)
Hardware Ibm Terminal Emulation TN5250 Bedienungsanleitung
(51 Seiten)
Hardware Ibm All-in-One Super7 Single Board Computer PCM-5896 Bedienungsanleitung
(128 Seiten)
Dokument drucken
Seite drucken 2
Kommentare zu diesen Handbüchern