DOC PREVIEW
NU MSIT 458 - Identity - Cisco

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1VisibilityForms of IdentityNetwork Access Control (Cisco)Why is Identity Important?Network Access ControlThe Future of IdentityWhat is Identity?Larry Edie & Annie BallewWho are you users? What do you know about your users?How can you cost-effectively manage this information? How can you use this information to enforce policy? VisibilityUser Based Identity◦Active Directory◦LDAP◦TokensMachine Based Identity◦Certificates◦Machine accountsIdentity based technologies◦802.1x◦Remote Access VPNForms of IdentityWhat else?4THE GOALNAC Server gathers and assesses user/device information Username and passwordDevice configuration and vulnerabilitiesNoncompliant deviceor incorrect loginAccess deniedPlaced to quarantine for remediationDevice is compliantPlaced on “certified devices list”Network access grantedNAC ServerNAC ManagerEnd user attempts to access networkInitial access is blockedSingle-sign-on or web loginAuthenticationServer123a3bQuarantineRoleIntranet/NetworkNetwork Access Control (Cisco)Regulatory Compliance◦PCI◦FISMAReducing RiskForensic AnalysisWhy is Identity Important?Why would we need NAC?◦You know who your users are, but do you know what they are carrying into your network? What are the implications of NAC?◦What are the maintenance implications? ◦How does this affect business productivity? Deployment Considerations◦What solutions are available? ◦Is it a worthwhile investment? Network Access ControlRole Based Access ControlFuture of NACWhat does Identity mean for future technical paradigms, such as IaaS, SaaS, and PaaS? The Future of


View Full Document

NU MSIT 458 - Identity - Cisco

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Hacked

Hacked

6 pages

Firewalls

Firewalls

52 pages

Load more
Download Identity - Cisco
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Identity - Cisco and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Identity - Cisco 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?