Information Technology Reference
In-Depth Information
802.1X
RADIUS
EAPoL
Host Attempts
Access
RADIUS
Messages
Host Attempts
Access
Cisco ACS
Server
Forward Credentials
to ACS
Request Credentials
Send Credentials
Authentication Answer
Accept/Reject
Set VLAN Policy
Apply Policy to Port
Figure 13-4
802.1X and EAPoL
Figure 13-5 shows the importance of the authentication databases and how many network
components in the enterprise rely on them for authentication services.
Detecting and Mitigating Threats
The use of threat detection and mitigation techniques enables early detection of and noti-
fications about unwanted malicious traffic. The goals are to detect, notify, and help stop
unforeseen and unauthorized traffic. These techniques help increase the network's avail-
ability, particularly against unidentified and unexpected attacks. Threat detection and mit-
igation solutions include the following:
Key
To p i c
Endpoint protection: Viruses and worms can create havoc by propagating infec-
tions from host to host throughout the network. Antivirus services can help hosts de-
tect and remove infections based on known virus pattern markings.
Application security and content security defense: Several new application
layer network products have been released that help address new classes of threats,
such as spam, phishing, spyware, packet abuse, and unauthorized point-to-point file
sharing. Content security products such as Cisco IronPort Appliances provide com-
prehensive antivirus, antispyware, file-blocking, antispam, URL blocking, and con-
tent-filtering services. These products supplement traditional firewalls and
network-based intrusion detection system (NIDS) solutions with more granular traffic
throughout the network.
 
 
Search WWH ::




Custom Search