Network Access Control ProCurve and Microsoft NAP Integration
|
|
|
- Estella Manning
- 10 years ago
- Views:
Transcription
1 HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft Network Access Protection overview...7 ProCurve IDM and Microsoft NAP integrated...9 Conclusion...11
2 Abstract Keeping important services and data available can be critical for the success of a company. One of these measures helps with reducing the risk from internal threats: Network Access Control. By using Microsoft s expertise in clients and servers, along with ProCurve s expertise in networking, it is possible to create an integrated solution for Network Access Control that provides personalized, appropriate network access to users and clients, without hindering their productivity. Microsoft Network Access Protection (NAP) provides a mechanism to test a client for company policy compliance, such as requiring that up-to-date antivirus software or firewall software is running. NAP also includes capabilities to automatically bring a client back into compliance. HP ProCurve Identity Driven Manager (IDM) provides a mechanism to set user-based performance and security settings on switches and access points, based on the user identity, the user s location, connection time, and device ID. This document describes ProCurve IDM and Microsoft NAP, and how the two products integrate to provide a complete Network Access Control solution. 2
3 Foundation Before deploying any security solution, it is important to help ensure that the infrastructure itself is secure. The security of an environment is as strong as its weakest link. Choosing the right components for the right task will help produce a secure foundation. Microsoft Windows Server 2008 and Microsoft Windows Vista both include security features to reduce the risk that servers or clients will become compromised. Some of the new technologies and features available include: Address Space Layout Randomization (ASLR), which loads system files at random addresses in memory. This helps prevent most remote execution attacks by preventing Return-to-libc buffer overflow attacks. Data Execution Prevention (DEP), which can flag certain parts of memory as containing data instead of executable code. This prevents overflow errors from resulting in arbitrary code execution. Windows Service Hardening, which prevents Windows Services from performing file system, registry, or network operations they are not supposed to do. Improved integrated firewall, which helps to keep out attackers at the client level. Network Access Protection (NAP), which will be discussed in more detail in this document. NAP tests clients to determine if they comply with the corporate policy. These and other security features can be configured centrally by using Active Directory with Group Policies, simplifying management. ProCurve LAN and wireless LAN (WLAN) products, such as the ProCurve Switch 5400zl Series and the Wireless Edge Services zl Module, include features to strengthen the security of the network and reduce the risk that the network devices will become compromised, as well as to protect clients and servers on the network. Some of the built-in technologies and features available include:* Virus throttling, which detects traffic patterns typical of worm viruses and can be configured to take action such as throttling or blocking the interface. Secure management access, which secures all access methods by encrypting through Secure Shell Version 2 (SSHv2), Secure Sockets Layer (SSL), and/or Simple Network Management Protocol Version 3 (SNMPv3). Multiple user authentication methods, such as IEEE 802.1X (discussed in more detail in this document), Web-based authentication, and MAC-based authentication, provide security and flexibility for guest users and non-ieee 802.1X capable clients. Rogue access point detection, which alerts the IT administrator when there are non-authorized access points on the network. User-based security settings, which will be discussed more in detail in this document, allow the network to configure itself to provide personalized, appropriate network access for each user. By using HP ProCurve Manager Plus and its plug-ins, security features can be managed network wide from one interface, simplifying management. Correctly implementing and configuring the security features available in Microsoft Windows Server 2008, Microsoft Windows Vista, and ProCurve network equipment can dramatically reduce the attack surface, giving hackers less of an opportunity to break security. Both ProCurve and Microsoft have security-specific products to further enhance overall network security. * Not all features and technologies are available on all ProCurve devices. 3
4 Network Access Control basics IT infrastructure is becoming more and more important for most companies. Even to the extent that any interruption in service or loss of data may cause a huge financial impact, or may even result in bankruptcy if the interruption is long enough. So it makes sense to reduce the risk of this happening from multiple avenues. Some examples are: Having a sound backup strategy Having a workable disaster recovery plan Having a redundant infrastructure Protecting against external threats Protecting against internal threats This white paper discusses protecting networks from internal threats and, more specifically, identifies the first line of defense against internal threats as Network Access Control. Network Access Control is a mechanism to help ensure that only appropriate users, who use only appropriate clients, can obtain appropriate access rights to the network. This helps defend against intentional and unintentional threats. Intentional threats can include unauthorized users trying to access any data or authorized users trying to access data they should not have access to. Unintentional threats can include authorized users that have a virus-infected laptop. Network Access Control works by evaluating multiple criteria of a user that tries to connect to the network, before setting the appropriate access right, or by denying access completely. Company policy dictates which criteria are used, and the network administrator can configure the network infrastructure to reflect this. Depending on which equipment and software are used, there can be different possible criteria. The framework used to achieve this is called IEEE 802.1X, which is an open standard developed by HP and Microsoft, among other companies. In the most basic setup, three components are needed: Authentication server IEEE 802.1X supplicant IEEE 802.1X authenticator IEEE 802.1X supplicant the entity requesting access to the network, such as the supplicant integrated in many Microsoft Windows versions IEEE 802.1X authenticator the entity requiring authentication from the supplicant, such as ProCurve switches and access points Authentication server the entity providing verification of the credentials provided by the IEEE 802.1X supplicant, usually a RADIUS server, such as Microsoft Network Policy Server 4
5 When a client connects to an IEEE 802.1X-enabled network either wired or wireless the following steps take place (the steps listed here are simplified; for complete details of the process, please reference RFC 3580): At first, only IEEE 802.1X traffic is allowed between the supplicant and the authenticator. Any other traffic the client sends will be dropped. The authenticator will request authentication from the supplicant. The supplicant provides the authenticator with its credentials. The authenticator forwards the credentials to the authentication server. The authentication server verifies the credentials and returns either an accept or a reject message to the authenticator. The authenticator will either allow or deny network access based on the message. ProCurve Identity Driven Manager overview ProCurve Identity Driven Manager (IDM) is a plug-in for ProCurve Manager Plus (PCM+) that extends the functionality and capabilities of a basic IEEE 802.1X setup, as mentioned earlier. Besides the provided credentials, IDM is also capable of using other criteria to make decisions. With IDM, the result can be more detailed than a simple reject or accept. The criteria IDM can use are the following: User identity, including group membership. Using a user directory, such as Microsoft Active Directory, IDM can differentiate between users and/or groups, such as John and Jane or Finance users and Research users. Time. Configured by an administrator, IDM can differentiate between times, such as working days from 9 a.m. to 5 p.m., holidays, or any other configured times, including start and end dates. Location. IDM can differentiate between different locations as specific as a single port on a switch or an access point, or as broad as a building, a site, or the entire network and everything in between. Device ID. Defined as the Media Access Control (MAC) address of a device, allowing users to be tied to clients, such as specific computers or PDAs. Each criterion can be used separately, in combination with others, or not at all, providing flexibility in differentiating between situations that need different network access rights. For example, John from Finance working at 10 a.m. from the third floor needs different network access than Jane, who is a guest to the company and is checking her wirelessly from the company cafeteria. To complement this flexibility, IDM allows the IT administrator to tailor network access based on the criteria mentioned. To achieve this, IDM is capable of the following per-user security and performance settings, in addition to allowing or denying access completely: Virtual local area network (VLAN) logically group clients that have similar network needs, such as segregating Finance and Research users Access Control Lists (ACLs) per-user ACLs allow access to network resources to be controlled at the entry point of the user from either a switch port or access point, such as denying access to the Finance server or permitting traffic to the Internet Quality of Service (QoS) setting the priority of the traffic originating from a user, such as setting a lower priority for guest users Rate limits limiting the available bandwidth, such as limiting the bandwidth for guest users that only need to check their 5
6 Each per-user setting can be used separately, in combination with others, or not at all, providing appropriate network access for each user in each situation. IDM uses an agent on the RADIUS (authentication) server for evaluating all criteria and for setting all per-user settings. Each IDM agent can work independently from the IDM server, allowing redundancy to be achieved with multiple RADIUS servers, rather than with multiple RADIUS servers and multiple IDM servers. The IDM server is used as a graphical front-end for configuration, event logging, and reporting. IDM is also capable of using other frameworks besides IEEE 802.1X, namely Web-authentication and MAC-authentication. But these are outside of the scope of this document. When using IDM, the setup is extended from the basic setup and now has the following components: Microsoft Windows XP or Windows Vista ProCurve switches and access points Windows Server 2008 NPS IDM agent ProCurve PCM+/IDM Active Directory Microsoft Windows Vista The client trying to access the network is running Windows Vista and uses the built-in supplicant for the authentication. ProCurve switch The switch is the authenticator and will require authentication from the client. Microsoft Network Policy Server (NPS) The RADIUS (among other things) server provided with Microsoft Windows Server 2008 will act as the authentication server. Active Directory The user directory that holds all user information, such as group memberships and credentials. IDM agent The part of IDM that evaluates the criteria and controls the per-user settings. PCM+/IDM The part of IDM where configuration changes are made, events are logged, and where the network administrator can create reports. When the client connects to this network, the following steps occur (simplified here): At first, only IEEE 802.1X traffic is allowed between the Windows Vista supplicant and the ProCurve switch. Any other traffic the client sends will be dropped by the switch. The ProCurve switch will request authentication from the Windows Vista supplicant. The Windows Vista supplicant provides the ProCurve switch with its credentials. The ProCurve switch forwards the credentials to the Microsoft NPS server. The Microsoft NPS server verifies the credentials against the Active Directory. 6
7 The IDM agent evaluates the other criteria: group membership, time, location, and MAC address. The IDM agent returns the appropriate per-user settings to the Microsoft NPS server, such as VLAN, ACLs, QoS, and rate limits. The Microsoft NPS server sends the ProCurve switch the results. The ProCurve switch sets the per-user settings and allows the appropriate access. The IDM agent sends an event to the IDM server. The IDM server receives events from the IDM agents, such as logon and logoff events. These events contain a lot of detail about the user logging on or off, including the time, location, MAC address, and bytes sent and received. This allows the network administrator to see who is connected to the network currently, including their details. Information about these sessions is stored, so it is also possible to view previous session details. With this historic data available, it is possible to generate reports from within IDM. There are multiple reports that are predefined, such as bandwidth usage (top users) and per-user session reports. Microsoft Network Access Protection overview Microsoft Network Access Protection (NAP) was introduced with the release of Microsoft Windows Server It provides functionality to control access to network resources based on a client s identity and compliance with corporate governance policy. NAP is capable of providing this functionality for the following types of network access communication: IEEE 802.1X-authenticated network connections Internet Protocol Security (IPSec)-protected traffic Remote access Virtual Private Network (VPN) connections Dynamic Host Configuration (DHCP) address configurations Terminal Services Gateway connections This section focuses on how NAP extends the basic IEEE 802.1X setup with determining the degree of compliance of a connecting client. The other methods are outside of the scope of this document. The server components of NAP run on Microsoft Windows Server 2008, whereas the client component is available on Microsoft Windows Server 2008, Windows Vista, and Windows XP Service Pack 3. NAP determines the level of compliance by validating the client s health state against the health requirement policies, as defined by the administrator. NAP includes the following configurable health requirements for Microsoft Windows 2008, Windows Vista, and Windows XP Service Pack 3: The client computer has firewall software installed and enabled The client computer has antivirus software installed and enabled The client computer has current antivirus updates installed Microsoft Update Services is enabled on the client computer The client computer has all recent software security updates installed of a configurable severity The client computer has antispyware software installed and enabled (only for Windows Server 2008 and Windows Vista) The client computer has current antispyware updates installed (only for Windows Server 2008 and Windows Vista) 7
8 With NAP, Microsoft also released an API, which allows third-party software vendors to create their own health requirements, extending the possibilities of what a client can be checked for. When the level of client compliance is determined, NAP can allow unrestricted access, limited access, or no access. There are two ways that NAP can restrict network access: Using a VLAN Using an user-based ACL This allows the administrator to configure access to only certain resources, such as remediation servers. For example, remediation servers can be servers that hold the antivirus updates or antispyware updates, so the client can automatically update itself to become compliant again. NAP also has the capability to automatically remediate a client, such as enabling the firewall or enabling automatic updates. When using NAP, the setup is extended from the basic setup and now has the following components: Microsoft Windows XP or Windows Vista NAP client ProCurve switches and access points Windows Server 2008 NPS Active Directory Microsoft Windows Vista The client trying to access the network is running Windows Vista and uses the built-in supplicant for the authentication. NAP client The built-in NAP client is responsible for collecting the system health information of the client. ProCurve switch The switch is the authenticator and will require authentication from the client. Microsoft Network Policy Server (NPS) running NAP The RADIUS (among other things) server provided with Microsoft Windows Server 2008 will act as the authentication server and the health policy server. Active Directory The user directory that holds all user information, such as group memberships and credentials. When the client connects to this network, the following steps occur (simplified here): At first, only IEEE 802.1X traffic is allowed between the Windows Vista supplicant and the ProCurve Switch. Any other traffic the client sends will be dropped by the switch. The ProCurve switch will request authentication from the Windows Vista supplicant. The Windows Vista supplicant provides the ProCurve switch with its credentials. 8
9 The ProCurve switch forwards the credentials to the Microsoft NPS server. The Microsoft NPS server verifies the credentials against the Active Directory. If the credentials are valid, the NAP server requests the health state from the NAP client. The NAP client sends its health state to the NAP server. The NAP server evaluates the health state and determines if the client is compliant. The NAP server returns the result to the NAP client and sets the appropriate parameters on the ProCurve switch. ProCurve IDM and Microsoft NAP integrated ProCurve IDM integrates seamlessly with Microsoft NAP to provide a complete Network Access Control solution. IDM is capable of interpreting the compliance state that the NPS server returns and using it as one if its criteria to determine which per-user settings to configure on the switch or access point. When IDM and NAP are integrated, the setup has the following components: Microsoft Windows XP or Windows Vista NAP client ProCurve switches and access points Windows Server 2008 NPS IDM agent ProCurve PCM+/IDM Active Directory Microsoft Windows Vista The client trying to access the network is running Windows Vista and uses the built-in supplicant for the authentication. NAP client The built-in NAP client is responsible for collecting the system health information of the client. ProCurve switch The switch is the authenticator and will require authentication from the client. Microsoft Network Policy Server (NPS) running NAP The RADIUS (among other things) server provided with Microsoft Windows Server 2008 will act as the authentication server and the health policy server. Active Directory The user directory that holds all user information, such as group memberships and credentials. IDM agent The part of IDM that evaluates the criteria and controls the per-user settings. PCM+/IDM The part of IDM where configuration changes are made, events are logged, and where the network administrator can create reports. 9
10 When the client connects to this network, the following steps occur (simplified here): At first, only IEEE 802.1X traffic is allowed between the Windows Vista supplicant and the ProCurve switch. Any other traffic the client sends will be dropped by the switch. The ProCurve switch will request authentication from the Windows Vista supplicant. The Windows Vista supplicant provides the ProCurve switch with its credentials. The ProCurve switch forwards the credentials to the Microsoft NPS server. The Microsoft NPS server verifies the credentials against the Active Directory. If the credentials are valid, the NAP server requests the health state from the NAP client. The NAP client sends its health state to the NAP server. The NAP server evaluates the health state and determines if the client is compliant. The NAP server returns the result to the NAP client. The IDM agent evaluates the other criteria: group membership, time, location, and MAC address, including the client s compliancy. The IDM agent returns the appropriate per-user settings to the Microsoft NPS server, such as VLAN, ACLs, QoS, and rate limits. The Microsoft NPS server sends the ProCurve switch the results. The ProCurve switch sets the per-user settings and allows the appropriate access. The IDM agent sends an event to the IDM server. Because NAP and IDM share a lot of the same components, there is no need for redundant configuration tasks or even redundant software installations. There is, for example, no need to have two clients on the user s computer, and both NAP and IDM use the same Active Directory. This allows for administration from a single interface, once initial configuration is completed. Getting an overview of which current users are online, getting a detailed report about a user that includes bandwidth usage and login times, or changing per-user performance and security settings can all be done from within the IDM application, including generating reports on company policy compliancy of clients. Integrating IDM and NAP is as easy as installing the IDM agent on the NPS server. 10
11 Conclusion Integrating Microsoft Network Access Protection and ProCurve Identity Driven Manager allows for a complete Network Access Control solution. Appropriate security and performance settings can be configured based on the user s identity, location, time, MAC address, and client s compliancy. IDM and NAP are built on IEEE 802.1X, an open standard that allows flexibility and cooperation between vendors. NAP also includes an API that allows software vendors to create their own health checks. Because of the tight integration between IDM and NAP, administration overhead is minimal. With Microsoft NAP and ProCurve IDM working together, the risks from internal threats are greatly reduced. The network will not allow unauthorized users to have access, but grants appropriate access to authorized users. Appropriate access also means limited access if the user s client does not comply with company policy. 11
12 For more information To find out more about ProCurve Networking products and solutions, visit our Web site at Copyright 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. Microsoft, Windows, and Windows Vista are U.S. registered trademarks of Microsoft Corporation. 4AA2-1544ENW, August 2008
How to configure 802.1X authentication with a Windows XP or Vista supplicant
An HP ProCurve Networking Application Note How to configure 802.1X authentication with a Windows XP or Vista supplicant Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Configuring
HP ProCurve Identity Driven Manager 3.0
Product overview HP ProCurve Identity Driven Manager (IDM), a plug-in to HP ProCurve Manager Plus, dynamically provisions network security and performance settings based on user, device, location, time,
HP Identity Driven Manager Software Series Overview
Overview HP Identity Driven Manager (IDM), a plug-in to HP PCM+, dynamically provisions network security and performance settings based on user, device, location, time, and endpoint posture. Identity Driven
Synchronizing ProCurve IDM and Windows Active Directory
An HP ProCurve Networking Application Note Synchronizing ProCurve IDM and Windows Active Directory Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network and Active Directory tree diagrams... 2
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
HP E-PCM Plus Network Management Software Series
Data sheet Product overview HP E-PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
HP PCM Plus v4 Network Management Software Series
HP PCM Plus v4 Network Management Software Series Data sheet Product overview HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network
How to Configure Web Authentication on a ProCurve Switch
An HP ProCurve Networking Application Note How to Configure Web Authentication on a ProCurve Switch Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Configuring the ProCurve
How to configure MAC authentication on a ProCurve switch
An HP ProCurve Networking Application Note How to configure MAC authentication on a ProCurve switch Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. Configuring the ProCurve
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
ProCurve Manager Plus 2.2
NEW ProCurve Manager Plus 2.2 ProCurve Manager Plus 2.2 is a secure, advanced Windows -based network management platform that allows administrators to configure, update, monitor, and troubleshoot ProCurve
QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features
Overview (Retired) HP PCM+ Network Management Software is a Microsoft Windows -based network management platform that enables mapping, network and device configuration, and monitoring. HP PCM+ provides
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
QuickSpecs. Models. Features and Benefits Mobility. ProCurve Wireless Edge Services zl Module. ProCurve Wireless Edge Services zl Module Overview
Overview Models J9051A Introduction Working in conjunction with ProCurve radio ports, the provides centralized wireless LAN configuration and management of advanced wireless services, enabling a resilient,
Interoperability between Avaya IP phones and ProCurve switches
An HP ProCurve Networking Application Note Interoperability between Avaya IP phones and ProCurve switches Contents 1. Introduction... 3 2. Architecture... 3 3. Checking PoE compatibility... 3 4. Configuring
USB Secure Management for ProCurve Switches
ProCurve Networking USB Secure Management for ProCurve Switches Introduction... 2 A simple solution with multiple uses... 2 Staged deployment... 2 Remote deployment or upgrade... 3 Troubleshooting... 3
Interoperability between Cisco Unified IP 7900 Series phones and ProCurve switches
An HP ProCurve Networking Application Note Interoperability between Cisco Unified IP 7900 Series phones and ProCurve switches Contents 1. Introduction... 3 2. Architecture... 3 3. Checking PoE compatibility...
HP Certified Professional
Securing HP ProCurve Networks Exam HP0-Y24 Exam Preparation Guide Purpose The intent of this guide is to set expectations about the context of the exam and to help candidates prepare for it. Recommended
HP PCM Plus v3 Network Management Software Series Overview
Overview HP PCM Plus Network Management is a Microsoft Windows -based network management platform that enables mapping, configuration, and monitoring. HP PCM Plus provides security and extensibility for
HP Intelligent Management Center User Access Management Software
Data sheet HP Intelligent Management Center User Access Management Software Key features One central database of users and available services Advanced reporting capabilities Directory of network-attached
HP Intelligent Management Center Basic WLAN Manager Software Platform
Data sheet HP Intelligent Management Center Basic WLAN Manager Software Platform Key features Intuitive, easy-to-use interface Unified wired and wireless network management Range of topology management
Network Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
Traffic monitoring with sflow and ProCurve Manager Plus
An HP ProCurve Networking Application Note Traffic monitoring with sflow and ProCurve Manager Plus Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. About the sflow protocol...
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
HP ProCurve Networking. Networking solutions for small and growing businesses
HP ProCurve Networking Networking solutions for small and growing businesses Contents A network you can depend on....................................1 Essential network connectivity....................................2
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
ProCurve Mobility Manager 1.0
ProCurve Mobility Manager 1.0, a plug-in module for the ProCurve Manager Plus platform, provides a simple yet powerful tool to centrally configure, update, monitor, and troubleshoot ProCurve access points.
ProCurve Networking. Hardening ProCurve Switches. Technical White Paper
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU
Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU JG659AAE Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support
HP Intelligent Management Center Standard Software Platform
Data sheet HP Intelligent Management Center Standard Software Platform Key features Highly flexible and scalable deployment Powerful administration control Rich resource management Detailed performance
Interoperability between Mitel IP Phones and ProCurve Switches
An HP ProCurve Networking Application Note Interoperability between Mitel IP Phones and ProCurve Switches Contents 1. Introduction... 3 2. Architecture... 3 3. Configuration... 3 3.1 Check power over Ethernet
HP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
HP Intelligent Management Center Enterprise Software. Platform. Key features. Data sheet
Data sheet HP Intelligent Management Center Enterprise Software Platform Key features Highly flexible and scalable deployment options Powerful administration control Rich resource management Detailed performance
ProCurve ProActive Defense: A Comprehensive Network Security Strategy
ProCurve Networking by HP ProCurve ProActive Defense: A Comprehensive Network Security Strategy Introduction...2 The Impact on Companies...2 The Security Approach Matters...3 What is Network Security?...3
Evolving Network Security with the Alcatel-Lucent Access Guardian
T E C H N O L O G Y W H I T E P A P E R Evolving Network Security with the Alcatel-Lucent Access Guardian Enterprise network customers encounter a wide variety of difficulties and complexities when designing
IP videoconferencing solution with ProCurve switches and Tandberg terminals
An HP ProCurve Networking Application Note IP videoconferencing solution with ProCurve switches and Tandberg terminals Contents 1. Introduction... 3 2. Architecture... 3 3. Videoconferencing traffic and
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
Network Immunity Solution. Technical White paper. ProCurve Networking
ProCurve Networking Network Immunity Solution Technical White paper Introduction... 2 Current Security Threats... 2 Solutions for Internal Threat Protection... 2 Network Immunity Solution: What It Is and
HP Intelligent Management Center Standard Software Platform
Data sheet HP Intelligent Management Center Standard Software Platform Key features Highly flexible and scalable deployment Powerful administration control Rich resource management Detailed performance
White Paper. BD Assurity Linc Software Security. Overview
Contents 1 Overview 2 System Architecture 3 Network Settings 4 Security Configurations 5 Data Privacy and Security Measures 6 Security Recommendations Overview This white paper provides information about
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Bluetooth Pairing. User Guide
Bluetooth Pairing User Guide Copyright 2012 Hewlett-Packard Development Company, L.P. Microsoft, Windows, and Windows Vista are U.S. registered trademarks of Microsoft Corporation. Bluetooth is a trademark
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Application Notes SAN/iQ Remote Copy Networking Requirements Legal Notices Warranty The only warranties for HP products and services are set forth in the express
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink
HP Network Configuration and Integration Service
HP Network Integration Service HP Services Technical data HP Network Integration Service provides a flexible way for you to receive HP networking configuration and integration assistance that meets your
HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations
HP ProLiant Essentials Vulnerability and Patch Management Pack Server Security Recommendations Security Considerations for VPM and HP SIM Servers Introduction... 3 External patch acquisition... 4 Comparing
Comprehensive LAN Security: A Business Requirement
ProCurve Networking by HP Comprehensive LAN Security: A Business Requirement Introduction... 2 The ProCurve ProActive Defense Strategy... 3 Combining Security Offense and Defense... 4 A Unified Platform
Network Security and the ProActive Defense
ProCurve Networking ProCurve ProActive Defense: A Comprehensive Network Security Strategy Introduction................................................. 2 The Impact of Network Security on Companies.......................
HP Virtualized Network Protection Service
HP Virtualized Network Protection Service HP Networking Consulting Technology Consulting Service overview With the proliferation of Virtual Datacenters (vdcs) and cloud computing environments, secure virtual
Using IEEE 802.1x to Enhance Network Security
Using IEEE 802.1x to Enhance Network Security Table of Contents Introduction...2 Terms and Technology...2 Understanding 802.1x...3 Introduction...3 802.1x Authentication Process...3 Before Authentication...3
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
HP ATA Networks certification
Certification guide HP ATA Networks certification Introduction In today s business environment, the lack of skills to execute IT technologies and cloud solutions is a roadblock for many companies trying
Ensuring HIPAA Compliance in Healthcare
White paper Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors, nurses, and staff while remaining connected
Using HP ProLiant Network Teaming Software with Microsoft Windows Server 2008 Hyper-V or with Microsoft Windows Server 2008 R2 Hyper-V
Using HP ProLiant Network Teaming Software with Microsoft Windows Server 2008 Hyper-V or with Microsoft Windows Server 2008 R2 Hyper-V HOWTO, 4 TH Edition Introduction... 2 Software requirements... 2 Order
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Implementing an Advanced Server Infrastructure (20414) H4D07S
HP Education Services course data sheet Implementing an Advanced Server Infrastructure (20414) H4D07S Course Overview In this course, you will cover new features and functionality in Windows Server 2012,
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
HP ProCurve Networking certification for resellers. Place yourself above the competition
HP ProCurve Networking certification for resellers Place yourself above the competition HP ProCurve Certified Professional program tracks Highest certification HP ProCurve Program Sales certifications
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise
WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise WICKSoft Corporation http://www.wicksoft.com Copyright WICKSoft 2007. WICKSoft Mobile Documents
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network
System 800xA Operations Operator Workplace Support for Mobile Devices
System 800xA Operations Operator Workplace Support for Mobile Devices System Version 6.0 Power and productivity for a better world TM System 800xA Operations Operator Workplace Support for Mobile Devices
HP Operations Orchestration Software
HP Operations Orchestration Software Software Version: 9.00 HP Project and Portfolio Management Integration Guide Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...
QuickSpecs. Models. Features and benefits Application highlights. HP 7500 SSL VPN Module with 500-user License
Overview Models JD253A Key features High performance hardware encryption Thin client and browser based access Multiple access authentication methods Remote security status checking Low Running Cost Product
Perspective on secure network for control systems in SPring-8
Perspective on secure network for control systems in SPring-8 Toru Ohata, M. Ishii, T. Fukui* and R. Tanaka JASRI/SPring-8, Japan *RIKEN/SPring-8, Japan Contents Network architecture Requirement and design
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 FTP Server Configuration Table of contents Overview... 2 IIS FTP server configuration... 2 Installing FTP v7.5 for IIS... 2 Creating an FTP site with basic authentication...
Administering Windows Server 2012 (20411) H4D01S
HP Education Services course data sheet Administering Windows Server 2012 (20411) H4D01S Course Overview This course is part two of a series of three courses. Through this series you will gain the skills
Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation [email protected]
Security and Compliance Robert Nottoli Principal Technology Specialist Microsoft Corporation [email protected] DISCLAIMER FOR DOCUMENTATION REGARDING PRE-RELEASED SOFTWARE This document supports a
Palo Alto Networks User-ID Services. Unified Visitor Management
Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS
HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for
Application Note User Groups
Application Note User Groups Application Note User Groups Table of Contents Background... 3 Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 6 Configuration...
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Application Notes Backup Exec 11D VSS Snapshots and Transportable Offhost Backup Legal Notices Warranty The only warranties for HP products and services are set
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Network Security Solutions Implementing Network Access Control (NAC)
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting a network with Sophos NAC Advanced and Switches Sophos NAC Advanced is a sophisticated Network Access Control
HP ProCurve Networking
Networking Networking solutions for small and growing businesses A network you can depend on...2 Essential network connectivity...3 Improved network performance for growing businesses...4 Increased security...5
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
HP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
How To Manage A Network With An Ipc (Ipc) And Ipc V2 (Ipv) On An Ipa (Ipa) On A Network On An Hp Zl (Ips) And V2 On A Pc (
Overview Models HP Network Immunity Manager v2 Software with 50-Device License HP Network Immunity Manager v2 100-Device License HP Network Immunity Manager v2 Software with Unlimited-Device License J9161A
HP ProLiant DL320 Firewall/VPN/Cache Server User Guide
HP ProLiant DL320 Firewall/VPN/Cache Server User Guide Running Microsoft Internet Security and Acceleration Server 2004 June 2005 (Third Edition) Part Number 341672-003 Copyright 2004, 2005 Hewlett-Packard
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Disaster Recovery Guide Table of contents Overview... 2 General recovery process... 2 Recovering the HPDM Server... 5 Backing up the data... 5 Installing the
