06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

OL-14386-02<br />

Posture Validation<br />

CHAPTER<br />

13<br />

The <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> Release 4.2, hereafter referred to as ACS, supports posture<br />

validation when ACS is deployed as part of a broader <strong>Cisco</strong> Network <strong>Access</strong> <strong>Control</strong> (NAC) solution.<br />

This chapter contains:<br />

What is Posture Validation?, page 13-1<br />

Posture Validation in Network <strong>Access</strong> <strong>Control</strong>, page 13-2<br />

Posture Validation and Network <strong>Access</strong> Profiles, page 13-3<br />

Posture Tokens, page 13-3<br />

The Posture Validation Process, page 13-4<br />

Policy Overview, page 13-5<br />

Internal Policies, page 13-7<br />

External Policies, page 13-8<br />

External Posture Validation Audit <strong>Server</strong>s, page 13-9<br />

Configuring NAC in ACS, page 13-13<br />

Configuring ACS in a NAC/NAP Environment, page 13-15<br />

Configuring Policies, page 13-15 (including internal, external, and audit server)<br />

Posture Validation Pages Reference, page 13-30<br />

What is Posture Validation?<br />

The term posture refers to the collection of attributes that play a role in the conduct and “health” of an<br />

endpoint device that is seeking access to the network. Some of these attributes relate to the endpoint<br />

device-type and operating system; other attributes belong to various security applications that might be<br />

present on the endpoint, such as antivirus (AV) scanning software.<br />

Posture validation applies a set of rules to the posture data associated with an endpoint. The result is an<br />

assessment of the level of trust associated with the endpoint. A posture token, such as Healthy or<br />

Infected, represents the state of the endpoint.<br />

The posture token becomes one of the conditions in the authorization rules <strong>for</strong> network access. Posture<br />

validation, together with the traditional user authentication, provides a complete security assessment of<br />

the endpoint and the user.<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

13-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!