Sign In
Upload
Manuals
Brands
IBM Manuals
Software
Network Access Control Solution
IBM Network Access Control Solution Manuals
Manuals and User Guides for IBM Network Access Control Solution. We have
1
IBM Network Access Control Solution manual available for free PDF download: User Manual
IBM Network Access Control Solution User Manual (516 pages)
Building a Network Access Control Solution with IBM Tivoli and Cisco Systems
Brand:
IBM
| Category:
Software
| Size: 14.94 MB
Table of Contents
Building a Network
1
Table of Contents
5
Notices
9
Trademarks
10
Preface
11
The Team that Wrote this Redbook
12
Become a Published Author
14
Comments Welcome
15
January 2007, Second Edition
17
Summary of Changes
17
Part 1. Architecture and Design
19
Chapter 1. Business Context
21
The Security Compliance and Remediation Concept
22
Why We Need this
23
Does this Concept Help Our Mobile Users
25
Corporate Security Policy Defined
26
Business Driver for Corporate Security Compliance
26
Achievable Benefits for Being Compliant
27
Conclusion
28
Chapter 2. Architecting the Solution
31
Solution Architectures, Design, and Methodologies
32
Architecture Overview
32
Network Admission Control
33
Architectural Terminology
37
Definition of a Network Admission Control Project
44
Phased Rollout Approach
44
Design Process
46
Security Compliance Management Business Process
46
Security Policy Life Cycle Management
48
Solution Objectives
50
Network Design Discussion
51
Implementation Flow
53
Scalability and High Availability
53
Conclusion
55
Chapter 3. Component Structure
57
Logical Components
58
Network Admission Control
59
Compliance
64
Remediation
69
Physical Components
70
Network Client
70
Network Access Infrastructure
72
IBM Integrated Security Solution for Cisco Networks Servers
72
Solution Data and Communication Flow
73
Secure Communication
80
Component Placement
81
Security Zones
81
Policy Enforcement Points
85
Conclusion
92
Part 2. Customer Environment
93
Chapter 4. Armando Banking Brothers Corporation
95
Company Profile
96
Current IT Architecture
97
Network Infrastructure
97
IBM Integrated Security Solution for Cisco Networks Lab
98
Application Security Infrastructure
103
Middleware and Application Infrastructure
104
Corporate Business Vision and Objectives
105
Project Layout and Implementation Phases
105
Conclusion
109
Chapter 5. Solution Design
111
Business Requirements
113
Functional Requirements
114
Security Compliance Requirements
114
Network Access Control Requirements
114
Remediation Requirements
115
Solution Functional Requirements
115
Implementation Architecture
119
Logical Components
120
Physical Components
134
Conclusion
141
Chapter 6. Compliance Subsystem Implementation
143
Tivoli Security Compliance Manager Setup
144
Installation of DB2 Database Server
144
Installation of Tivoli Security Compliance Manager Server
158
Configuration of the Compliance Policies
170
Posture Collectors
171
Policy Collector
172
Installation of Posture Collectors
173
Customization of Compliance Policies
179
Assigning the Policy to the Clients
204
Deploying the Client Software
207
Cisco Trust Agent
208
IBM Tivoli Security Compliance Manager Client
217
Conclusion
230
Chapter 7. Network Enforcement Subsystem Implementation
231
Configuring NAC Framework Components
232
Configuring the Cisco Secure ACS for NAC L2 802.1X
232
Installing Cisco Secure Acs
233
Configuring the Administrative Interface to Cisco Secure Acs
234
Allowing Administrator Access Via Http (Optional)
236
Cisco Secure Acs Certificate Setup
237
Using an Acs Self-Signed Certificate
238
Importing Ibm Security Compliance Manager Attributes
241
Configuring Logging
244
Configuring a Network Device Group in Cisco Secure Acs
247
Configuring Radius Attributes
254
Configuring Groups
255
Configuring Users
257
Global Authentication Setup
259
Configuring Posture Validation
262
Configuring the Cisco Secure ACS for NAC L2/L3 IP
301
Deployment of the Network Infrastructure
309
Configuring NAC Appliance Components
321
Installing CCA Agent
322
Configuring a CCA OOB VG Server
324
Creating Local Users
350
Deployment of the Network Infrastructure
370
Conclusion
372
Chapter 8. Remediation Subsystem Implementation
373
Automated Remediation Enablement
375
Remediation Server Software Setup
376
Prerequisites
376
Tivoli Configuration Manager
377
Preparing for the Installation
378
Configuration of the Remediation Server
403
Installation of the Software Package Utilities
412
Creating Remediation Instructions for the Users
415
Locating HTML
416
Variables and Variable Tags
420
Debug Attributes
424
Creating HTML Pages for ABBC Policy
427
Building the Remediation Workflows
435
Modification of the Remediation Packages
454
Conclusion
455
Part 3
457
Appendix A. Hints and Tips
459
Deployment Overview
460
Top-Level Sequence of Events
462
Security Compliance Manager and NAC Compliance Subsystem
464
Cisco NAC Sequence of Events
465
Fault Isolation
466
Security Compliance Manager Server and Client
468
Communication Port Usage
469
Tools and Tricks
469
Cisco NAC
469
Tools and Tricks for the Client
471
NAC Appliance Details
473
NAC Appliance Integration
475
Conclusion
488
Appendix B. Network Admission Control
489
Executive Summary
490
The Benefit of NAC
490
Dramatically Improve Network Security
491
NAC Implementation Options
492
The NAC Appliance
493
NAC Framework Solution
494
Investment Protection
494
Planning, Designing, and Deploying an Effective NAC Solution
495
The Next Steps
496
NAC Technology
496
NAC Appliance Components
496
NAC Framework Components
497
Appendix C. Additional Material
499
Locating the Web Material
499
Using the Web Material
500
How to Use the Web Material
500
Related Publications
501
IBM Redbooks
501
Other Publications
501
Online Resources
502
How to Get IBM Redbooks
502
Help from IBM
503
Index
505
Advertisement
Advertisement
Related Products
IBM S544-5285-01
IBM SC34-5764-01
IBM TIVOLI SC23-8765-00
IBM TIVOLI SC32-0129-00
IBM MAXIMO SG24-7645-00
IBM SPSS Data Collection
IBM Selectric III - Correcting Selectric III
IBM S822L
IBM Power System S824
IBM Redbooks ServeRAID-MR10M
IBM Categories
Server
Desktop
Storage
Laptop
Monitor
More IBM Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL