SlideShare a Scribd company logo
•Layered Infrastructure
•Policy based
•Open to third parties
•Denied network access/Quarantine
•Remediation
•NAP clients
Private
Network
Unhealthy
computer
Healthy computer
Accessing the network
X
Remediation
Server
NPS
HRA
Client
No Policy
Authentication Optional
Authentication
Required
Client
System Health Agent (SHA)
Quarantine Agent (QA)
Enforcement Client (EC)
Services
Remediation Server
Network Access Device and Server
System Health Server
Network Policy Server (NPS)
Quarantine Server (RADIUS)
System Health Validator (SHV)
Client SHV
NPS
Remediation
Network Access Device or Server
(RADIUS)
(SHV)
According to
policy, the client is
not up to date.
Quarantine client,
request it to
update.
Should this client be
restricted based
on its health?
Requesting access.
Here’s my new
health status.
MS NPSClient
802.1x
Switch
Remediation
Servers
May I have access?
Here’s my current
health status.
Ongoing policy
updates to Network
Policy Server
You are given
restricted access
until fix-up.
Can I have
updates?
Here you go.
Restricted Network
Client is granted access to
full intranet.
System Health
Servers
According to
policy, the client is
up to date.
Grant access.
•Nap client available for XP sp2
•Cisco Network Admission Control (NAC)
•Avenda Linux NAP Agent
Features
 Authentication Methods PEAPv0 (EAP-MSCHAPv2)
 PEAPv0 (EAP-TLS)
 Health Check Firewall Status - Check for firewall status, with auto-remediation
 Service Status - Check for different services. Auto-remediate by starting or stopping services.
 Firewall Ports - Check status of open or blocked TCP/UDP ports
 Anti-Virus Status - Check if anti-virus software is up-to-date
 Supported Platforms;
Redhat Enterprise Linux 4 and above
CentOS 5 and above
Fedora Core 6 and above
Avenda Linux NAP SHV for Microsoft NPS Features
 Health Check Firewall Status - Check for firewall status and open/blocked ports.
Auto Remediation - Turn on firewall; block or open ports.
 Service Status - Check status of different services running on the system.
Auto Remediation - Start or stop services.
 Anti-Virus Status - Check if anti-virus is running.
Auto Remediation - Start anti-virus.
Features
 Authentication Methods PEAPv0 (EAP-MSCHAPv2)
 PEAPv0 (EAP-TLS)
 Health Check Firewall Status - Check for firewall status, with auto-remediation
 Service Status - Check for different services. Auto-remediate by starting or stopping services.
 Firewall Ports - Check status of open or blocked TCP/UDP ports
 Anti-Virus Status - Check if anti-virus software is up-to-date
 Supported Platforms;
Redhat Enterprise Linux 4 and above
CentOS 5 and above
Fedora Core 6 and above
Avenda Linux NAP SHV for Microsoft NPS Features
 Health Check Firewall Status - Check for firewall status and open/blocked ports.
Auto Remediation - Turn on firewall; block or open ports.
 Service Status - Check status of different services running on the system.
Auto Remediation - Start or stop services.
 Anti-Virus Status - Check if anti-virus is running.
Auto Remediation - Start anti-virus.

More Related Content

What's hot

Spirent MethodologyCenter - Network Answers
Spirent MethodologyCenter - Network AnswersSpirent MethodologyCenter - Network Answers
Spirent MethodologyCenter - Network Answers
Malathi Malla
 
NuvoSys Solutions, LLC
NuvoSys Solutions, LLCNuvoSys Solutions, LLC
NuvoSys Solutions, LLC
nygonz
 
Why Configuration Management Matters
Why Configuration Management MattersWhy Configuration Management Matters
Why Configuration Management Matters
ManageEngine, Zoho Corporation
 
5 reasons to use OpManager Plus
5 reasons to use OpManager Plus5 reasons to use OpManager Plus
5 reasons to use OpManager Plus
ManageEngine, Zoho Corporation
 
Monitoring Clusters and Load Balancers
Monitoring Clusters and Load BalancersMonitoring Clusters and Load Balancers
Monitoring Clusters and Load Balancers
Prince JabaKumar
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
David Wallom
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
ManageEngine, Zoho Corporation
 
Network Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai SeminarNetwork Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai Seminar
ManageEngine, Zoho Corporation
 
Application-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerApplication-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManager
ManageEngine, Zoho Corporation
 
OpManager Technical Overview
OpManager Technical OverviewOpManager Technical Overview
OpManager Technical Overview
ManageEngine, Zoho Corporation
 
5 ways you can benefit from OpManager Plus
5 ways you can benefit from OpManager Plus5 ways you can benefit from OpManager Plus
5 ways you can benefit from OpManager Plus
ManageEngine, Zoho Corporation
 
Free Netflow analyzer training - diagnosing_and_troubleshooting
Free Netflow analyzer  training - diagnosing_and_troubleshootingFree Netflow analyzer  training - diagnosing_and_troubleshooting
Free Netflow analyzer training - diagnosing_and_troubleshooting
ManageEngine, Zoho Corporation
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
ManageEngine, Zoho Corporation
 
The 3 aspects of network performance management
The 3 aspects of network performance managementThe 3 aspects of network performance management
The 3 aspects of network performance management
ManageEngine
 
5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster
ManageEngine, Zoho Corporation
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheet
guest3f034b
 
Op Manager7
Op Manager7Op Manager7
Op Manager7
lfair
 
Network performance management using OpManager
Network performance management using OpManagerNetwork performance management using OpManager
Network performance management using OpManager
ManageEngine
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
ManageEngine, Zoho Corporation
 
Virtualization and IT Challenges
Virtualization and IT ChallengesVirtualization and IT Challenges
Virtualization and IT Challenges
ICE Solution
 

What's hot (20)

Spirent MethodologyCenter - Network Answers
Spirent MethodologyCenter - Network AnswersSpirent MethodologyCenter - Network Answers
Spirent MethodologyCenter - Network Answers
 
NuvoSys Solutions, LLC
NuvoSys Solutions, LLCNuvoSys Solutions, LLC
NuvoSys Solutions, LLC
 
Why Configuration Management Matters
Why Configuration Management MattersWhy Configuration Management Matters
Why Configuration Management Matters
 
5 reasons to use OpManager Plus
5 reasons to use OpManager Plus5 reasons to use OpManager Plus
5 reasons to use OpManager Plus
 
Monitoring Clusters and Load Balancers
Monitoring Clusters and Load BalancersMonitoring Clusters and Load Balancers
Monitoring Clusters and Load Balancers
 
Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...Trust and Cloud computing, removing the need for the consumer to trust their ...
Trust and Cloud computing, removing the need for the consumer to trust their ...
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
Network Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai SeminarNetwork Configuration Management - Mumbai Seminar
Network Configuration Management - Mumbai Seminar
 
Application-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManagerApplication-aware Network Performance Management with OpManager
Application-aware Network Performance Management with OpManager
 
OpManager Technical Overview
OpManager Technical OverviewOpManager Technical Overview
OpManager Technical Overview
 
5 ways you can benefit from OpManager Plus
5 ways you can benefit from OpManager Plus5 ways you can benefit from OpManager Plus
5 ways you can benefit from OpManager Plus
 
Free Netflow analyzer training - diagnosing_and_troubleshooting
Free Netflow analyzer  training - diagnosing_and_troubleshootingFree Netflow analyzer  training - diagnosing_and_troubleshooting
Free Netflow analyzer training - diagnosing_and_troubleshooting
 
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solveTop 5 problems a NETWORK ANALYSIS TOOL will help you solve
Top 5 problems a NETWORK ANALYSIS TOOL will help you solve
 
The 3 aspects of network performance management
The 3 aspects of network performance managementThe 3 aspects of network performance management
The 3 aspects of network performance management
 
5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster5 Ways NCM Can Save You From A Disaster
5 Ways NCM Can Save You From A Disaster
 
Net Rounds Product Sheet
Net Rounds Product SheetNet Rounds Product Sheet
Net Rounds Product Sheet
 
Op Manager7
Op Manager7Op Manager7
Op Manager7
 
Network performance management using OpManager
Network performance management using OpManagerNetwork performance management using OpManager
Network performance management using OpManager
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
Virtualization and IT Challenges
Virtualization and IT ChallengesVirtualization and IT Challenges
Virtualization and IT Challenges
 

Similar to Network Access Protection

Network Access COntrol asdfcxzqwe asd asdd .ppt
Network Access COntrol asdfcxzqwe asd asdd .pptNetwork Access COntrol asdfcxzqwe asd asdd .ppt
Network Access COntrol asdfcxzqwe asd asdd .ppt
jrsocmad
 
802.1x Authentication Standard
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication StandardDan Miller
 
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET Journal
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討Timothy Chen
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
csk selva
 
Webinar: SecurePlanHealth Updates
Webinar: SecurePlanHealth UpdatesWebinar: SecurePlanHealth Updates
Webinar: SecurePlanHealth Updates
Knight Security Systems
 
Spirent SDN and NFV Solutions
Spirent SDN and NFV SolutionsSpirent SDN and NFV Solutions
Spirent SDN and NFV Solutions
Malathi Malla
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV Deployments
Sailaja Tennati
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
Aruba, a Hewlett Packard Enterprise company
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
Bibekananada Jena
 
IVYWorks
IVYWorksIVYWorks
IVYWorks
ivyworks
 
OpenVPN
OpenVPNOpenVPN
OpenVPN
francisdinha
 
Larry fermi generic nac overview-expanded - atlseccon2011
Larry fermi   generic nac overview-expanded - atlseccon2011Larry fermi   generic nac overview-expanded - atlseccon2011
Larry fermi generic nac overview-expanded - atlseccon2011
Atlantic Security Conference
 
Season 3 [free OpManager training]_Part1- Discovery and classification
Season 3 [free OpManager training]_Part1- Discovery and classificationSeason 3 [free OpManager training]_Part1- Discovery and classification
Season 3 [free OpManager training]_Part1- Discovery and classification
ManageEngine, Zoho Corporation
 
Nagios, Getting Started.
Nagios, Getting Started.Nagios, Getting Started.
Nagios, Getting Started.
Hitesh Bhatia
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Statistics & Data Corporation
 
Validating Apache Pulsar’s Behavior under Failure Conditions - Pulsar Summit ...
Validating Apache Pulsar’s Behavior under Failure Conditions - Pulsar Summit ...Validating Apache Pulsar’s Behavior under Failure Conditions - Pulsar Summit ...
Validating Apache Pulsar’s Behavior under Failure Conditions - Pulsar Summit ...
StreamNative
 
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
Supachai Jaturaprom
 

Similar to Network Access Protection (20)

Network Access COntrol asdfcxzqwe asd asdd .ppt
Network Access COntrol asdfcxzqwe asd asdd .pptNetwork Access COntrol asdfcxzqwe asd asdd .ppt
Network Access COntrol asdfcxzqwe asd asdd .ppt
 
PIW ISE best practices
PIW ISE best practicesPIW ISE best practices
PIW ISE best practices
 
802.1x Authentication Standard
802.1x Authentication Standard802.1x Authentication Standard
802.1x Authentication Standard
 
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...IRJET-  	  Analysis on the Open Security Issues in 802.1x EAP Security Standa...
IRJET- Analysis on the Open Security Issues in 802.1x EAP Security Standa...
 
0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討0828 Windows Server 2008 新安全功能探討
0828 Windows Server 2008 新安全功能探討
 
Systems and network architectures
Systems and network architecturesSystems and network architectures
Systems and network architectures
 
Webinar: SecurePlanHealth Updates
Webinar: SecurePlanHealth UpdatesWebinar: SecurePlanHealth Updates
Webinar: SecurePlanHealth Updates
 
Spirent SDN and NFV Solutions
Spirent SDN and NFV SolutionsSpirent SDN and NFV Solutions
Spirent SDN and NFV Solutions
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV Deployments
 
ClearPass Policy Model - An Introduction
ClearPass Policy Model - An IntroductionClearPass Policy Model - An Introduction
ClearPass Policy Model - An Introduction
 
6421 b Module-05
6421 b Module-056421 b Module-05
6421 b Module-05
 
IVYWorks
IVYWorksIVYWorks
IVYWorks
 
OpenVPN
OpenVPNOpenVPN
OpenVPN
 
Larry fermi generic nac overview-expanded - atlseccon2011
Larry fermi   generic nac overview-expanded - atlseccon2011Larry fermi   generic nac overview-expanded - atlseccon2011
Larry fermi generic nac overview-expanded - atlseccon2011
 
Season 3 [free OpManager training]_Part1- Discovery and classification
Season 3 [free OpManager training]_Part1- Discovery and classificationSeason 3 [free OpManager training]_Part1- Discovery and classification
Season 3 [free OpManager training]_Part1- Discovery and classification
 
Nagios, Getting Started.
Nagios, Getting Started.Nagios, Getting Started.
Nagios, Getting Started.
 
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROsWebinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
Webinar: How to Ace Your SaaS-based EDC System Validation for Sponsors and CROs
 
Validating Apache Pulsar’s Behavior under Failure Conditions - Pulsar Summit ...
Validating Apache Pulsar’s Behavior under Failure Conditions - Pulsar Summit ...Validating Apache Pulsar’s Behavior under Failure Conditions - Pulsar Summit ...
Validating Apache Pulsar’s Behavior under Failure Conditions - Pulsar Summit ...
 
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
[NGINX Webinar Forum] Tune health check parameter to reduce app down time slide
 
Epitome Corporate PPT
Epitome Corporate PPTEpitome Corporate PPT
Epitome Corporate PPT
 

More from Zernike College

2013 0605 presentatie ict-dag klaar
2013 0605 presentatie ict-dag klaar2013 0605 presentatie ict-dag klaar
2013 0605 presentatie ict-dag klaar
Zernike College
 
2011-0623-PresentatieWirelessHacking.docx
2011-0623-PresentatieWirelessHacking.docx2011-0623-PresentatieWirelessHacking.docx
2011-0623-PresentatieWirelessHacking.docxZernike College
 
2011-0623Mobilesinonderwijs.pdf
2011-0623Mobilesinonderwijs.pdf2011-0623Mobilesinonderwijs.pdf
2011-0623Mobilesinonderwijs.pdfZernike College
 
2011 0414 digiborden presentatie ipon
2011 0414 digiborden presentatie ipon2011 0414 digiborden presentatie ipon
2011 0414 digiborden presentatie iponZernike College
 
Kunst en technologie
Kunst en technologieKunst en technologie
Kunst en technologie
Zernike College
 
Energie en ict presentatie flexines - 2011-03-10
Energie en ict    presentatie flexines - 2011-03-10Energie en ict    presentatie flexines - 2011-03-10
Energie en ict presentatie flexines - 2011-03-10
Zernike College
 
Ict is fantastisch ict-noord-nederland - maart 2011
Ict is fantastisch  ict-noord-nederland - maart 2011Ict is fantastisch  ict-noord-nederland - maart 2011
Ict is fantastisch ict-noord-nederland - maart 2011
Zernike College
 
PRESENTATIE MOVARE over live@edu ipon 2011
PRESENTATIE MOVARE over live@edu ipon 2011PRESENTATIE MOVARE over live@edu ipon 2011
PRESENTATIE MOVARE over live@edu ipon 2011Zernike College
 
2011 0414 google docs versus microsoft live@edu
2011 0414 google docs  versus microsoft live@edu2011 0414 google docs  versus microsoft live@edu
2011 0414 google docs versus microsoft live@edu
Zernike College
 
Office 365
Office 365Office 365
Office 365
Zernike College
 
2010 1124 digiborden presentatie i&i
2010 1124 digiborden presentatie i&i2010 1124 digiborden presentatie i&i
2010 1124 digiborden presentatie i&iZernike College
 
Battle of the clouds
Battle of the cloudsBattle of the clouds
Battle of the clouds
Zernike College
 
Why buy the taxi if you can pay
Why buy the taxi if you can payWhy buy the taxi if you can pay
Why buy the taxi if you can payZernike College
 
OFFICE 365 peter dehaas
OFFICE 365 peter dehaasOFFICE 365 peter dehaas
OFFICE 365 peter dehaas
Zernike College
 
2010 1111 live edu gebruikersdag
2010 1111 live edu gebruikersdag2010 1111 live edu gebruikersdag
2010 1111 live edu gebruikersdagZernike College
 
Ruckus Wireless bij ICT-noord
Ruckus Wireless bij ICT-noordRuckus Wireless bij ICT-noord
Ruckus Wireless bij ICT-noord
Zernike College
 

More from Zernike College (20)

2013 0605 presentatie ict-dag klaar
2013 0605 presentatie ict-dag klaar2013 0605 presentatie ict-dag klaar
2013 0605 presentatie ict-dag klaar
 
Mart 120419 ict noord
Mart 120419 ict noordMart 120419 ict noord
Mart 120419 ict noord
 
2011-0623-PresentatieWirelessHacking.docx
2011-0623-PresentatieWirelessHacking.docx2011-0623-PresentatieWirelessHacking.docx
2011-0623-PresentatieWirelessHacking.docx
 
2011-0623Mobilesinonderwijs.pdf
2011-0623Mobilesinonderwijs.pdf2011-0623Mobilesinonderwijs.pdf
2011-0623Mobilesinonderwijs.pdf
 
2011 0414 digiborden presentatie ipon
2011 0414 digiborden presentatie ipon2011 0414 digiborden presentatie ipon
2011 0414 digiborden presentatie ipon
 
It service management
It service managementIt service management
It service management
 
Kunst en technologie
Kunst en technologieKunst en technologie
Kunst en technologie
 
Energie en ict presentatie flexines - 2011-03-10
Energie en ict    presentatie flexines - 2011-03-10Energie en ict    presentatie flexines - 2011-03-10
Energie en ict presentatie flexines - 2011-03-10
 
Ict is fantastisch ict-noord-nederland - maart 2011
Ict is fantastisch  ict-noord-nederland - maart 2011Ict is fantastisch  ict-noord-nederland - maart 2011
Ict is fantastisch ict-noord-nederland - maart 2011
 
PRESENTATIE MOVARE over live@edu ipon 2011
PRESENTATIE MOVARE over live@edu ipon 2011PRESENTATIE MOVARE over live@edu ipon 2011
PRESENTATIE MOVARE over live@edu ipon 2011
 
2011 0414 google docs versus microsoft live@edu
2011 0414 google docs  versus microsoft live@edu2011 0414 google docs  versus microsoft live@edu
2011 0414 google docs versus microsoft live@edu
 
Office 365
Office 365Office 365
Office 365
 
2010 1124 digiborden presentatie i&i
2010 1124 digiborden presentatie i&i2010 1124 digiborden presentatie i&i
2010 1124 digiborden presentatie i&i
 
Battle of the clouds
Battle of the cloudsBattle of the clouds
Battle of the clouds
 
Cloudcomputingkennisnet
CloudcomputingkennisnetCloudcomputingkennisnet
Cloudcomputingkennisnet
 
Why buy the taxi if you can pay
Why buy the taxi if you can payWhy buy the taxi if you can pay
Why buy the taxi if you can pay
 
Office 365
Office 365Office 365
Office 365
 
OFFICE 365 peter dehaas
OFFICE 365 peter dehaasOFFICE 365 peter dehaas
OFFICE 365 peter dehaas
 
2010 1111 live edu gebruikersdag
2010 1111 live edu gebruikersdag2010 1111 live edu gebruikersdag
2010 1111 live edu gebruikersdag
 
Ruckus Wireless bij ICT-noord
Ruckus Wireless bij ICT-noordRuckus Wireless bij ICT-noord
Ruckus Wireless bij ICT-noord
 

Recently uploaded

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Network Access Protection

  • 1. •Layered Infrastructure •Policy based •Open to third parties •Denied network access/Quarantine •Remediation •NAP clients
  • 3. Accessing the network X Remediation Server NPS HRA Client No Policy Authentication Optional Authentication Required
  • 4. Client System Health Agent (SHA) Quarantine Agent (QA) Enforcement Client (EC) Services Remediation Server Network Access Device and Server System Health Server Network Policy Server (NPS) Quarantine Server (RADIUS) System Health Validator (SHV) Client SHV NPS Remediation Network Access Device or Server (RADIUS) (SHV)
  • 5. According to policy, the client is not up to date. Quarantine client, request it to update. Should this client be restricted based on its health? Requesting access. Here’s my new health status. MS NPSClient 802.1x Switch Remediation Servers May I have access? Here’s my current health status. Ongoing policy updates to Network Policy Server You are given restricted access until fix-up. Can I have updates? Here you go. Restricted Network Client is granted access to full intranet. System Health Servers According to policy, the client is up to date. Grant access.
  • 6.
  • 7. •Nap client available for XP sp2 •Cisco Network Admission Control (NAC) •Avenda Linux NAP Agent
  • 8.
  • 9. Features  Authentication Methods PEAPv0 (EAP-MSCHAPv2)  PEAPv0 (EAP-TLS)  Health Check Firewall Status - Check for firewall status, with auto-remediation  Service Status - Check for different services. Auto-remediate by starting or stopping services.  Firewall Ports - Check status of open or blocked TCP/UDP ports  Anti-Virus Status - Check if anti-virus software is up-to-date  Supported Platforms; Redhat Enterprise Linux 4 and above CentOS 5 and above Fedora Core 6 and above Avenda Linux NAP SHV for Microsoft NPS Features  Health Check Firewall Status - Check for firewall status and open/blocked ports. Auto Remediation - Turn on firewall; block or open ports.  Service Status - Check status of different services running on the system. Auto Remediation - Start or stop services.  Anti-Virus Status - Check if anti-virus is running. Auto Remediation - Start anti-virus.
  • 10. Features  Authentication Methods PEAPv0 (EAP-MSCHAPv2)  PEAPv0 (EAP-TLS)  Health Check Firewall Status - Check for firewall status, with auto-remediation  Service Status - Check for different services. Auto-remediate by starting or stopping services.  Firewall Ports - Check status of open or blocked TCP/UDP ports  Anti-Virus Status - Check if anti-virus software is up-to-date  Supported Platforms; Redhat Enterprise Linux 4 and above CentOS 5 and above Fedora Core 6 and above Avenda Linux NAP SHV for Microsoft NPS Features  Health Check Firewall Status - Check for firewall status and open/blocked ports. Auto Remediation - Turn on firewall; block or open ports.  Service Status - Check status of different services running on the system. Auto Remediation - Start or stop services.  Anti-Virus Status - Check if anti-virus is running. Auto Remediation - Start anti-virus.

Editor's Notes

  1. This scenario will examine how Network Access Protection works with DHCP/VPN. [BUILD1] Health policy is set by the IT administrator. It is asynchronously plumbed by the system health servers to the IAS policy server. The IAS policy server keeps a health cache at any given time. [BUILD2] The client requests network access, and forwards its statement of health (SoH). [BUILD3] The Network Access Device sends this information to the IAS policy server. [BUILD4] IAS compares it to what’s in cache and if the SoH doesn’t meet health policy, the IAS policy server notifies the Network Access Device to restrict the client – it could be put in a VLAN or separate subnet. The IAS policy server also informs the NAD what the client needs to become healthy. [BUILD5] The NAP system information passed to the client by the NAP systems tells it how to access the fix-up servers. [BUILD6] The client contacts the remediation server and requests update. [BUILD7] The Remediation Server provides the client with the necessary updates so it will pass the required system health policies. [BUILD8] The client returns to the Network Access Device with an updated SoH. [BUILD9] The Network Access Device sends this information to the IAS policy server. [BUILD10] This time it matches policy so the client gains full access to network resources. The SoH is re-used to continue to access network resources until the policy is updated.
  2. Enforcement works virtually the same whether you are using DHCP, VPN, 802.1X, or IPsec: healthy clients are given full access and unhealthy clients are restricted. Administrators can configure Dynamic Host Configuration Protocol (DHCP) Enforcement, virtual private network (VPN) Enforcement, IEEE 802.1X Enforcement, Internet Protocol security (IPsec) Enforcement, or all four, depending on their network needs. Network Access Protection provides an infrastructure and an API set for extending Network Access Protection functionality. Vendors and software developers can use the API set to build their own network policy validation, ongoing network policy compliance, and network isolation components that are compatible with Network Access Protection. Network Access Protection allows for customer choice by providing options beyond just DHCP and VPN enforcement. Some extra benefits of IPsec-based enforcement include the ability to isolate unhealthy clients. In addition, secure enforcement cannot be bypassed by a reconfiguring client or by use of hubs and virtual PC technology. With IPsec, infrastructure upgrade aren’t necessary, because it works with today’s switches and routers. IPsec also offers flexible isolation: healthy systems can connect to quarantined systems but not vice versa, and the isolation model defined by policy Microsoft recommends that organizations use the enforcement mechanisms in combination. Each customer is different and will need to assess many factors, such as risk, business models, health policies and management, access scenarios, infrastructure investments, and upgrade schedule, among other things. NAP empowers the customer to make a selection based on the unique circumstances of a customer’s environment without compromising on the need for a strong, multi-layered network security and access policy management solution.