|
por este dispositivo também tem outras instruções :
Facilidade de uso
Network Access Control
Advancements in computer networking have significantly changed the way people and organizations
communicate and access information. Networks have become critical resources in many
organizations, providing real-time communications and access, through both the Internet and
enterprise intranets, to unprecedented levels of information. In addition, much of the data available on
internal business networks needs to be protected, either to follow data privacy regulations or to
protect valuable information assets. As such, the need to provide reliable and secure network access
has become a key challenge facing today’s Information Technology (IT) organizations.
As organizations take advantage of the benefits of making information available, they also need to
consider the security implications. They must protect valuable proprietary information. They also might
be responsible for complying with government regulations related to data privacy. This leads to two
business objectives that many IT organizations are striving to maximize: data availability and data
security. While addressing each of these objectives individually can be straightforward, the methods
used to address one often conflict with the other. Therefore, it is important for organizations to
address these objectives together.
To meet these needs adequately requires a layered security approach, often defined as Defense in
Depth. NAC is one component of such an approach, and should not be considered in isolation. The
high level role of NAC is to protect the network and its resources from harmful users and devices or
systems. It does this by restricting network access based on certain criteria and business policies. The
policies may be quite simple, such as allowing access to a set of known users or devices while
denying all others. Or, in order to model more intricate business policies, the policies may be much
more complex.
NAC works together with other network security layers such as firewalls, Intrusion Detection and
Prevention Systems (IDPS), endpoint security, and so forth to build a defensive posture in your
environment. NAC should be used to minimize the risk associated with unauthorized, infected, or
improperly configured devices trying to connect to your network.
In its most basic form, NAC allows a network administrator to restrict network access to authorized
users and/or devices. However, many organizations have the need to provide, or can benefit from
providing, different levels of access depending on the role of the user. For example, employees have
access to internal network resources and the Internet while guest users are only provided access to the
external Internet.
There is also a need for protection from malicious software, which is accomplished by evaluating the
security posture of devices connecting to the network. The security posture required is defined by
organizational policies and is based on checking for things such as operating system versions and
patches, security software (antivirus, anti-spam, firewalls, etc.), security settings on common software,
and other required or prohibited software.
There are many aspects to a complete network security implementation. This white paper addresses
use cases of Network Access Control (NAC) as applied to HP thin clients and blade PCs to control
their access to a production network and the information available on that network. It also describes
the access control solution provided by ProCurve networking by HP.
ProCurve Networking Access Control
The ProCurve Access Control Solution is based on the ProCurve Adaptive EDGE Architecture and its
“command from the center” approach to management. It begins with ProCurve network devices that
push intelligence to the edge of the network, where users and devices connect. The ProCurve Identity
Driven Manager (IDM) product is a network access policy server that dynamically adapts network
ports to the needs of the user and device(s). The ProCurve Network Access Controller 800 enables a
simplified authentication service deployment, along with endpoint integrity policy verification.
Together, these products create a comprehensive access control solution that fortifies network security.
This solution implements the ProCurve Network Access Controller 800.
3
... Este manual também é adequado para os modelos :
Computadores - HP BladeSystem bc2500 Blade PC (1.5 mb)
Computadores - HP Compaq t5720 Thin Client (1.5 mb)
Computadores - HP Compaq t5725 Thin Client (1.5 mb)