Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cisco network admission control, volume I : NAC framework architecture and design (Networking Technology Series)
Helfrich D., Ronnau L., Frazier J., Forbes P., Cisco Press, 2006. 244 pp. Type: Book (9781587052415)
Date Reviewed: Oct 23 2007

As a leading manufacturer of network security technology products, Cisco publishes a series of technical handbooks describing its product line and offering technical guidance in applied network implementations. One such family of proprietary network security products uses a process called network admission control (NAC) to effectively enforce security policy compliance on all devices seeking access to network computing resources. A NAC-based schema uses the Extant network infrastructure to only allow access to compliant and trusted endpoint devices (such as personal computers and servers), while restricting the network access of even remediating noncompliant devices.

This review covers the first volume of the NAC-based product series, which describes Cisco’s approach to the design and implementation of a NAC framework architecture and associated control protocols. (Volume 2 of this series considers the deployment and troubleshooting of a Cisco NAC approach.) These handbooks specifically focus on Cisco NAC framework release 2.0 technologies, and provide an in-depth technical description of each element of the Cisco NAC 2.0 architecture and process protocols. Their implementation and operation within a Cisco-based self-defending network are also covered. In addition to providing an introduction to the Cisco NAC framework, volume 1 specifically addresses design guidelines for enforcing network admission policies and how to handle NAC agentless host processors. These guidelines describe NAC conforming network designs that only allow access to trusted and compliant endpoint devices. They identify noncompliant endpoint devices, effectively deny them access, place them in a quarantined area for remediation, or give them controlled (restricted) access to designated network resources.

This handbook is organized into eight chapters, and sequentially covers each of the technologies and protocols that are components of the Cisco NAC framework. The first two chapters introduce and provide an overview of this NAC framework; subsequent chapters build on these framework elements by describing specific tasks necessary to prepare, plan, design, implement, operate, and optimize a target NAC framework solution. The last section of each chapter presents summary review questions (the answers are found in the appendix). Unfortunately, this volume does not include a technical glossary or definitions of key terms. In addition, the authors assume that the reader has a solid understanding of the Cisco SAFE security blueprint, and a familiarity with Cisco security point products and security technologies.

This handbook will be a useful reference for networking and security professionals responsible for the implementation and operation of any Cisco NAC framework 2.0-based network. Due to its focus on a family of specific Cisco network security products, it would not be particularly useful for those in an educational or network design environment--such an audience requires a more general understanding of network security solutions.

Reviewer:  A. G. Larson Review #: CR134862 (0809-0823)
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
Access Schemes (C.2.5 ... )
 
 
Design Studies (C.4 ... )
 
 
Local and Wide-Area Networks (C.2.5 )
 
 
Network Operations (C.2.3 )
 
 
Security and Protection (K.6.5 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy