版权声明:原创作品,允许转载,转载时请务必以超链接形式标明文章原始出版、作者信息和本声明。否则将追究法律责任。
http://blog.youkuaiyun.com/topmvp - topmvp
*Effectively deploy the Cisco Trust Agent
*Configure Layer 2 IP and Layer 2 802.1x NAC on network access devices
*Examine packet flow in a Cisco IOS NAD when NAC is enabled, and configure Layer 3 NAC on the NAD
*Monitor remote access VPN tunnels
*Configure and troubleshoot NAC on the Cisco ASA and PIX security appliances
*Install and configure Cisco Secure Access Control Server (ACS) for NAC
*Install the Cisco Security Agent Manage-ment Center and create agent kits
*Add antivirus policy servers to ACS for external antivirus posture validation
*Understand and apply audit servers to your NAC solution
*Use remediation servers to automatically patch end hosts to bring them in compliance with your network policies
*Monitor the NAC solution using the Cisco Security Monitoring, Analysis, and Response System (MARS)
http://rapidshare.com/files/25372584/b-628b01.zip
http://depositfiles.com/files/762752
*Effectively deploy the Cisco Trust Agent
*Configure Layer 2 IP and Layer 2 802.1x NAC on network access devices
*Examine packet flow in a Cisco IOS NAD when NAC is enabled, and configure Layer 3 NAC on the NAD
*Monitor remote access VPN tunnels
*Configure and troubleshoot NAC on the Cisco ASA and PIX security appliances
*Install and configure Cisco Secure Access Control Server (ACS) for NAC
*Install the Cisco Security Agent Manage-ment Center and create agent kits
*Add antivirus policy servers to ACS for external antivirus posture validation
*Understand and apply audit servers to your NAC solution
*Use remediation servers to automatically patch end hosts to bring them in compliance with your network policies
*Monitor the NAC solution using the Cisco Security Monitoring, Analysis, and Response System (MARS)
http://rapidshare.com/files/25372584/b-628b01.zip
http://depositfiles.com/files/762752