... the Endpoint Security server.
Endpoint Security
January 9, 20 08
Gateway Integration Guide
Version NGX 7.0 GA
Endpoint Security Gateway Integration Guide 5
Contents
Preface
About this Guide 10
About ... theEndpoint Security server:
1 Enable 80 2. 1x communication. See page 23 .
2 Create a catalog for the gateway. See page 23 .
3 Assign a policy to the gateway catalog. See page 23 .
Enabling 80 2. 1x Communication
To ... NAS 85
Setting the Reauthentication Interval 86
Configuring Endpoint Computers 87
Troubleshooting 88
Chapter 8Cisco ASA
System Requirements 90
Cooperative Enforcement with ASA 91
Workflow 92
Basic...
... CCSP, CCNP, CCDP
Cisco Security Setup & Configuration:
Part 3 – Network & Host-Based IPS
Copyright 20 06 Global Knowledge T
raining LLC. All rights reserved.
Page 2
s
nmp version 3 The Simple ... your security configuration,
and to learn more about network security from certified
security instructors
. Good luck and have fun!
Web sites for creating a security policy
http://www.computersecuritynow.com
http://www
.sans
.org/resources/policies/#primer
http:/ /security. berkeley.edu/pols.html
Web ... (ISRs)
ISRs are the new 180 0, 28 0 0, and 380 0 series routers, which have the ability to integrate routing, security,
voice, and wireless into a single chassis
. From a security standpoint, they...
... Translation
(NA
Tting).
Copyright 20 06 Global Knowledge T
raining LLC. All rights reserved.
Page 4
Ex. Cisco 184 1,
384 5, 720 6
Ex. Cisco Catalyst
3750, 4506, 6513
Ex. Cisco PIX 525 ,
ASA 5540
N
ote
:
This ... CCSI, CCSP, CCNP, CCDP
Cisco Security Setup & Configuration:
Part 1 – a Layered Approach
Copyright 20 06 Global Knowledge T
raining LLC. All rights reserved.
Page 2
t
ion and protecting switches ... Global Knowledge T
raining LLC. All rights reserved.
Page 12
Cisco Security
Setup & Configuration:
Part 1 –
a Layered Approach
1 -80 0-COURSES
www.globalknowledge.com
Expert Reference Series...
... (ISRs)
ISRs are the new 180 0, 28 0 0, and 380 0 series routers, which have the ability to integrate routing, security,
voice, and wireless into a single chassis
. From a security standpoint, they ... your security configuration,
and to learn more about network security from certified
security instructors
. Good luck and have fun!
Web sites for creating a security policy
http://www.computersecuritynow.com
http://www
.sans
.org/resources/policies/#primer
http:/ /security. berkeley.edu/pols.html
Web ... device
you want to manage, either through a web interface or simple command line. Figure 8 shows a sample
topology using a Cisco 25 11 as your console server.
The benefit of this approach is direct,...
... Endpoint Security access to the RADIUS server. See page 20 .
2 Configure Endpoint Security. See page 23 .
a Enable 80 2. 1x communication. See page 23 .
b Create a catalog for the gateway. See page 23 .
c ... page 23 .
3 Configure the NAS. See page 25 .
4 Configure the endpoint computer. See page 26 .
Endpoint Security Gateway Integration Guide 5
Contents
Preface
About this Guide 10
About the Endpoint Security ... Server 18
Configuring the NAS as a RADIUS Client 18
Configuring Endpoint Security as a RADIUS Client 19
Configuring Endpoint Security Access to the RADIUS Server 20
Configuring Endpoint Security 23
Enabling...
... your GPO 20
Chapter 3 Third-party Distribution
Installation CommandLine 22
Command- Line Components 22
Command- Line Syntax 22
MSI Switches 23
Chapter 4 Client Parameters
Keys and Passwords 25
Install ... 23
Endpoint Security Client Management Guide 30
Command Line Switches
Use commandline switches to make changes to your Endpoint Security clients after
installation.
To use commandline switches:
1. ...
Endpoint Security client directly on just a few computers, you see the Endpoint Security
Administrator Guide for installation instructions.
Installation CommandLine page 22
MSI Switches page 23
Endpoint...