The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2010 vol.14)
pp: 77-80
Steve Hanna , Juniper Networks
Susan Thomson , Cisco Systems
ABSTRACT
Network Endpoint Assessment (NEA) is a set of protocols allowing an enterprise to automatically check a device's compliance with security policy when it attaches to the network. Compliance checks might specify, for example, that critical security patches and antivirus software are installed and up-to-date.
INDEX TERMS
Network Endpoint Assessment, endpoint security, security protocols, Internet, NEA
CITATION
Steve Hanna, Susan Thomson, "NEA: Public Health for the Network", IEEE Internet Computing, vol.14, no. 3, pp. 77-80, May/June 2010, doi:10.1109/MIC.2010.72
REFERENCES
1. P. Sangster et al., Network Endpoint Assessment (NEA): Overview and Requirements, IETF RFC 5209, June 2008; www.ietf.org/rfcrfc5209.txt.
2. T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5246, Aug. 2008; www.ietf.org/rfcrfc5209.txt.
3. B. Aboba et al., Extensible Authentication Protocol (EAP), IETF RFC 3748, June 2004; www.ietf.org/rfcrfc3748.txt.
4. IEEE Standards for Local and Metropolitan Area Networks: Port-Based Network Access Control, IEEE standard 802.1X-2004, 2004.
5. P. Sangster and K. Narayan, A Posture Attribute (PA) Protocol Compatible with Trusted Network Connect (TNC), IETF RFC 5792, Mar. 2010; www.ietf.org/rfcrfc5792.txt.
6. R. Sahita et al., A Posture Broker (PB) Protocol Compatible with Trusted Network Connect (TNC), IETF RFC 5793, Mar. 2010; www.ietf.org/rfcrfc5793.txt.
32 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool