Efficient and easy-to-use network access control and dynamic vlan management. Date: F r e e N A C. n e t Swisscom
|
|
|
- Johnathan Nelson
- 10 years ago
- Views:
Transcription
1 Efficient and easy-to-use network access control and dynamic vlan management Date: F r e e N A C. n e t Swisscom 1
2 Connection to the enterprise LAN is often (too) easy LAN sockets may be located in open work spaces: Open-plan offices Meeting rooms Hallways and printing corners Unlocked wiring closets (Too) many people may have physical access to LAN ports: Employees Visitors Cleaning staff, Electricians, etc. 2 The enterprise LAN needs to be easy to use and reliable, however: Many people (visitors, employees, cleaners, temporary staff) may have physical access to the offices Network sockets may be located in open work spaces, or meeting rooms. Network connections may not be documented Mobility requires more flexibility and security The amount of Laptops in companies is growing Potentially more than one user per Network Socket (often there are more hubs or small unmanaged switches than expected) Re-organizations are more frequent, so the network needs to easily adapt 2
3 The need for dynamic LAN management Ethernet cabling is difficult to change and expensive. Is Cabling documented? Does LAN management allow easy segmentation of PCs/Devices? Can Visitors / Externals be given LAN access safely and easily? Is cabling dynamically used, or cables reserved per segment? 3 Current cabling should be dynamically used: on the appropriate network when needed without the need for (expensive) manual intervention or reconfiguration LAN management should allow easy segmentation of PCs/Devices e.g. Printer zone, office zone, lab1, lab2, External zone segments should be configurable by helpdesk/1 st level support, not Switch specialists 3
4 The need for network access control Enterprises may be faced with the following problems: Do we know what is on the LAN? Live inventory? How do we authorise or block end devices? How do we enforce LAN access security policies? 4 Access Control Foreign laptops (or desktops, webcams, ), connected to the enterprise LAN, represent a potential security risk. Security/access rights should be managed. Limit access to devices we know and have some trust in. Live inventory: Access control means having an up-to-date inventory of end devices. It may also mean having an inventory of the topology of the LAN (which switches, hubs, routers, end devices etc. in which rooms) including a cabling plan. The following questions then arise: How can we manage our inventory efficiently? Especially if we have many end devices? Can we prevent having multiple inventories one for network access control and one for hardware management / (financial) accounting? Can we integrate these inventories? 4
5 The need for Compliance with security or governance standards Management System Governance ISO SOX BS 7799 ISO BSI COBIT IT Security ITIL IT 5 Is compliance with security standards such as: Information Security Management System (ISO17799), Sarbanes-Oxley (SOX 404), important for you? Is compliance with IT management/governance standards: ITIL, etc. an issue? NAC can help to: -limit access to network resources -provide tracking of what devices were on the network, where, when -provide a live inventory of devices, and link it to static inventory -provide compliance reports tying together Network, User, Device information. 5
6 The Solution: NAC Technology: Access is granted based on the MAC address (or 802.1x) and an appropriate Virtual LAN assigned. 6 HOW IT WORKS: The Switch detects a new PC and requests authorisation from NAC via the VMPS protocol, which checks its Database and refuses or grants access based on the MAC address 802.1x is supported with User Authentication in the Windows Domain or Certificates, and Vlan assignment based on MAC address VMPS mode: only for Cisco Switches and any kind of network device (PC, Printers, IP phones, Webcams, etc) NAC can directly replace other VMPS solutions, or manual port based MAC lists with major improvements in ease of use. 6
7 Features Dynamic (location based) virtual LAN assignment LAN port access control Automated end-device inventory Switch port programming Can work with Hubs/un-managed switches Friendly User Interface Enterprise features: Linking of enterprise information sources: Users (AD), Devices: (MS- SMS), Anti-virus, DNS, Router tables, static inventory Redundancy, load balancing, advanced monitoring and alerting Documentation of LAN cabling Emergency off for disaster response 7 SQL database provides scalability, flexibility and easier integration, and allows querying of live network inventory: external databases can be linked in, to integrate into your Workflow and processes: user databases (Active Directory, DireX, XML), end-device databases (MS-SMS), MS-WSUS, Anti-Virus (McAfee), DNS, Routers (MAC/IP tables via SNMP), switch (port restarts / detection of unmanaged devices) and customer in-house static inventory databases scanning module to identify operating system version and open ports scanning module to identify devices on unmanaged or static switch ports emergency off tool for disaster recovery redundancy: 1 master and many slaves allow high availability and load distribution (we come back to this in 3 slides) Live inventory: VMPS managed devices and unmanaged devices (switches scanned via SNMP): Mac, I.P. Address, Hostname Operating System & Hostname: via nmap scanning Cross reference data in external databases such as MS-SMS, WSUS, McAfee EPO. 7
8 NAC Benefits No software needed on end devices Allows a more dynamic, efficient LAN/cabling Proven technology: in production since GUI can be used by helpdesk, Cisco expertise is not needed Extensible: open interfaces optimal Workflow integration OpenSource NAC works with (legacy & new) Cisco switches More efficient than manual port-based access or VMPS Easier to implement than classical 802.1x 8 no software is currently needed on end devices Open: Open Standards, open source, open review integrate NAC more easily into your Workflows and existing Processes NAC works with (even old) Cisco switches (Other vendors many be added on request, or as custom developments) Customers who already use manual port-based access will save time and gain effectiveness A dynamic network allows Better use of available switch ports (efficiency, cost savings) quick configuration of new ports, can be configured by Helpdesk easier switch configuration (ports are dynamic) less changes in cabling during re-organisations Extensible: add your own modules, or interfaces to your Systems to better integrate MAC into your Processes and Workflow. NAC runs on standard hardware & Operating Systems (Linux/Unix) 8
9 Reducing the Risk of Unauthorised LAN access NAC offers cost-effective significant risk reduction without affecting Business operations NAC will continue to evolve lowering risk further (e.g. using 802.1x and health checking ) while allowing customers to migrate smoothly x offers stronger device authentication, but is more complex and requires newer switches. NAC strives to offer the best of both worlds: mac-address and 802.1x support. -Currently we can integrate the Patch status from Microsoft WSUS and McAfee EPO. -Long term, our aim is to use a standards based pre and post-connect security checking, such as TNC (Trusted Network Connect) 9
10 Architecture 10 The minimal components required are a VMPS or 802.1x capable switch and one NAC master server 10
11 Architecture 11 NAC consists of One Master server with Database and Control programs Optionally: one or more slave servers for redundancy and load distribution In a fully integrated environment, NAC requires: Syslog messages from switches Access to an server for delivery of alerts Access to DNS for discovering names associated IP addresses Optionally: SNMP read/write access to switches (to restart ports and scan for unmanaged end devices) Optionally: SNMP read access to routers (to query MAC/IP tables) Optionally: Interface to Enterprise Static Inventory, User, Device, Inventory, MS-SMS, MS-Wsus, McAfee EPO, or other database NAC is remotely configured via a Windows-based GUI, that may be installed on one or more a Windows PC or via a Web-based interface. 11
12 Usage scenarios: Where can I use NAC? 12 NOTES NAC is useful Where you need efficient cable/port management and/or LAN access control: Research and development units: with many subnets, and need to build dynamic subnets quickly. Workstation LANS Meeting rooms Rooms exposed to the public, or non-company employees Large Open Floor Plan offices During re-organisations to better track and control network access Where is NAC not needed? (i.e. Dynamic Ports are not needed, but automated port scanning/documentation is still useful) Physically secured Server rooms DMZs (for vmps mode: mac based identification is probably not secure enough, however 802.1x may be interesting.) 12
13 Summary Swisscom NAC enables LAN access control, live inventory and dynamic vlan management requires no software on clients works today in heterogeneous environments allows integration into your IT processes/tools via open interfaces
14 Appendix: Optional slides 14 14
15 How NAC works If Unknown, access is denied or limited to quarantine If OK, access to Corporate Network 15 How version 2 works.. 15
16 How NAC works: vmps mode 16 16
17 17 Version 2.1 Summer 06: nmap scanning modules, OS detection Linking to McAfee EPO Anti-virus server Linking to Microsoft SMS (systems management server) Support of Virtual Machines as client, and also as NAC servers! Version 2.2 Mar 07: ldap integration into MS Active Directory Detection and inventory of other devices on the network not actively managed. Auto documentation of when ports were last used, with what vlan, and mode. Automated switch discovery for initial installations 802.1x support for Wired LANs Version V3.0 Nov.07: configuration of switch ports from the windows GUI configuration of NAC server options from the windows GUI Automated switch scanning for unmanaged systems Microsoft WSUS, McAfee EPO integration Complete code object-oriented rewrite, for better reliability, separation of features, and ease of adding new features. New Policy interface with pre and post-connect methods. 17
18 Network Authentication with 802.1x The 802.1x standard allows authentication of devices in LAN or Wireless networks, using cryptographic techniques it provides higher security x authenticate the user or the device BUT: new switches are usually required Vendor interoperability complexity (support, supplicants, certificate management,..) cost interaction with Hubs. NAC includes 802.1x since V x and MAC address can be combined, by for example authenticating the user via Domain Logon and the Device via MAC address allow a Vlan assignment based on the device identification (MAC address), not the user name
19 Problems With Cisco VMPS and MAC Port Authentication If the above products are already in use for limiting LAN access already, what are the limitations? Lack of management features Monitoring Alerting Ease of use GUI User & device DB integration Lack of support from Cisco 19 19
20 What does the User Interface look like? 20 This is one view in the Windows GUI from Version 2.1. There are also dedicated Web GUIs for specific tasks. 20
21 Windows GUI: system details 21 In blue is the crucial MAC information: mac address and the vlan we assign. In red is information about where the end-device was last seen, and where. 21
22 Windows GUI: system details 22 The Nmap scanning module can detection operating system version and open ports. It can scan one device immediately, or the list of IPs in the NAC database on a scheduled basis. If the McAfee EPO module is enabled, the operating system of end devices, as reported by McAfee, and the current Anti-Virus status, can be displayed. Beside the Anti-Virus tab, we also se an inventory, which is where we link to you in-house static Inventory Database, if required. 22
23 Windows GUI: Switch & Ports 23 23
24 NAC also shows switch/port usage Switch Port Patch PC 24 A Web GUI that maps switch port usage in the last 24 hours. We see one device on port 2/13, it is connected via cable X in room 4.16, where the PC murderdrool is attached and this PC is assigned to the Use ALLGAE We also see a printer on port 2/24 24
25 Web GUI: edit mode 25 25
26 What do automated Alerts look like? 26 A new device has been connected to the network (port 2/40 switch sw0303), but not authorised. -it was in room on Cable socket X (this is the name written on the socket in the wall) -in this room the users Schenker, Wyler and Berger have their offices -The user TGDSCED1 has been documented as using this cable The super-users defined for this switch are Schädler and Rappo, so they receive the Alert, along with the NAC Administrators. 26
ForeScout CounterACT. Device Host and Detection Methods. Technology Brief
ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...
ACME Enterprises IT Infrastructure Assessment
Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3
Advanced Diploma In Hardware, Networking & Server Configuration
Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking
Kaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking
StarMOBILE Network Configuration Guide A guide to configuring your StarMOBILE system for networking INTRODUCTION... 3 BEFORE YOU BEGIN... 3 1) CONFIRM YOU HAVE THE LATEST SOFTWARE... 3 2) INSTALL THE STARMOBILE
VIA COLLAGE Deployment Guide
VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
SUMMIT ASSET MANAGEMENT DATASHEET
SUMMIT ASSET MANAGEMENT DATASHEET SUMMIT, Symphony SUMMIT, the Symphony SUMMIT logo, and all other Symphony SUMMIT product, brand or service names are registered trademarks or trademarks of Symphony SUMMIT,
Designing a Windows Server 2008 Network Infrastructure
Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure
Lab 4.5.2 Diagramming Intranet Traffic Flows
Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Bypassing Network Access Control Systems
1 Bypassing Network Access Control Systems Ofir Arkin, CTO Blackhat USA 2006 [email protected] http://www.insightix.com 2 What this talk is about? Introduction to NAC The components of a NAC solution
Device Lifecycle Management
Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.
SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
Reliable DNS and DHCP for Microsoft Active Directory Protecting and Extending Active Directory Infrastructure with Infoblox Appliances
Reliable DNS and DHCP for Protecting and Extending Active Directory Infrastructure with Infoblox Appliances Reliable DNS and DHCP for (AD) is the distributed directory service and the information hub of
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
Configure ISE Version 1.4 Posture with Microsoft WSUS
Configure ISE Version 1.4 Posture with Microsoft WSUS Document ID: 119214 Contributed by Michal Garcarz, Cisco TAC Engineer. Aug 03, 2015 Contents Introduction Prerequisites Requirements Components Used
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
Use of The Information Services Active Directory Service (AD) Code of Practice
Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be
Course Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
Evolving Network Security with the Alcatel-Lucent Access Guardian
T E C H N O L O G Y W H I T E P A P E R Evolving Network Security with the Alcatel-Lucent Access Guardian Enterprise network customers encounter a wide variety of difficulties and complexities when designing
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Lab 8.4.2 Configuring Access Policies and DMZ Settings
Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set
Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6
Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,
How To Understand and Configure Your Network for IntraVUE
How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Remote Infrastructure Support Services & Managed IT Services
Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The
Student Halls Network. Connection Guide
Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to
Kaseya 2. User Guide. Version R8. English
Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as
ClearOS Network, Gateway, Server Quick Start Guide
ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview
This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network
70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf.
70-682 Microsoft Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician http://www.pass4sureofficial.com Dumpspdf.com is a reputable IT certification examination guide, study guides and
NETWORK ADMINISTRATOR
JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under
Auditing the LAN with Network Discovery
Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and
How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an
No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis
IntraVUE Plug Scanner/Recorder Installation and Start-Up
IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
Freshservice Discovery Probe User Guide
Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements
LEARNING SOLUTIONS website milner.com/learning email [email protected] phone 800 875 5042
Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
IT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.
IT Assessment Report Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.7979 Table of Contents Executive Summary 3 IT Summary 3 Assessment Goal
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
IP Telephony Management
IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
6445A - Implementing and Administering Windows Small Business Server 2008
6445A - Implementing and Administering Windows Small Business Server 2008 Course Number: 6445A Course Length: 5 Days Course Overview This 5 day course provides students with the necessary knowledge to
ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)
ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3
The software can be downloaded from the Spiceworks web site at: http://www.spiceworks.com.
Spiceworks 2.0 Review One of the biggest headaches a network or system administrator faces is managing all of the equipment, software and services their network provides. From servers to workstations,
SOLIDserver IPAM for Microsoft
Solution Paper SOLIDserver IPAM for Microsoft The volume of hardware and virtual devices connecting to the internet and to corporate networks has led to exponential growth in the number of IP addresses
CHOOSING A RACKSPACE HOSTING PLATFORM
CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project
How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On
Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network
3.5 EXTERNAL NETWORK HDD. User s Manual
3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility
Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011
Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011 Opportunities in Automating Infrastructure Why Automation in Data Center? Tiers, compartments and complexity Work
WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with
Software. Quidview 56 CAMS 57. XLog NTAS 58
Software Quidview 56 CAMS 57 XLog NTAS 58 55 Quidview Quidview Network Management System Quidview network management software is a suite of scalable tools for simplifying the network management and maintenance.
MOC 6435A Designing a Windows Server 2008 Network Infrastructure
MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
RES ONE Automation 2015 Task Overview
RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Information Technology Mission Statement. Information Technology Goals
Ionia County Information Technology Strategic Plan 2008-2013 Table of Contents Information Technology Mission 3 Information Technology Goals 3 Current Network Overview 4-5 Information Technology Focus
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES
OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,
GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management
GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and
LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client
LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled
"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary
Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with
ManageEngine Desktop Central Training
ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions
CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills
Network Terminology Review
Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized
CA Desktop Management Suite r11
Data Sheet CA Desktop Management Suite r11 CA Desktop Management Suite automates the processes that support an organization s end-user computing needs, helping to ensure the optimum configuration of Windows
Understand VLANs, Wired LANs, and Wireless LANs
LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)
ForeScout Technologies Is A Leader Among Network Access Control Vendors
For ForeScout Technologies Is A Leader Among Network Access Control Vendors Excerpted From The Forrester Wave : Network Access Control, Q2 2011 by John Kindervag with Stephanie Balaouras, Robert Whiteley,
SATO Network Interface Card Configuration Instructions
SATO Network Interface Card Configuration Instructions Table of Contents 1. Reset of wired/wireless interface card... 3 2. Installing the All-In-One Utility (recommended)... 4 3. Configuring wired/wireless
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435
coursemonster.com/au Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 View training dates» Overview This course will provide students with an understanding
ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011
ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review
Enabling Internet Connection Sharing on Windows 2000 15. Enabling ICS On Windows XP As The Host 4 Enabling ICS On Windows XP As The Client 11
Sharing an Internet Connection with SatDirect Plus Table of Contents Contents Section 1: Section 2: Section 3: Introduction... 1 Physical Setup......2 Enabling Internet Connection Sharing on Windows XP
Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU
Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU JG659AAE Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support
MSP Service Matrix. Servers
Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server
Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide
Dramatically simplifying voice and data networking HOW-TO GUIDE Bundle Quick Start Guide 2 edgebox How-To Guide - Table of Contents Scope of the Quick-Start Guide...3 edgebox bundles...3
UBIQUITI BRIDGE CONFIGURATION PROCEDURE (PowerStation & NanoStation Units ONLY)
UBIQUITI BRIDGE CONFIGURATION PROCEDURE (PowerStation & NanoStation Units ONLY) Hardware Installation 1. Initial placement for programming and configuration purposes should be performed in an indoor environment.
IT Onsite Service Contract Proposal. For. <<Customer>> Ltd
IT Onsite Service Contract Proposal For Ltd 1 of 14 I N T R O D U C T I O N This Service Contract for Onsite Deskside PC Support (this Service Contract ) is made effective as of February 5th,
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
WhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
Upper Perkiomen School District
Upper Perkiomen School District Network Infrastructure Review Executive Summary Prepared by 1001 James Drive, Suite A15 Leesport, PA 19533 610 916 9400 www.jlrconsulting.com Date: March 10, 2015 Report
Network Access Control ProCurve and Microsoft NAP Integration
HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
Technology Blueprint. Enforcing Endpoint Compliance on the network. Police your managed and unmanaged systems with Network Access Control (NAC)
Technology Blueprint Enforcing Endpoint Compliance on the network Police your managed and unmanaged systems with Network Access Control (NAC) LEVEL 2 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL
