The Community for Technology Leaders
RSS Icon
Issue No.03 - May/June (2010 vol.14)
pp: 77-80
Steve Hanna , Juniper Networks
Susan Thomson , Cisco Systems
Network Endpoint Assessment (NEA) is a set of protocols allowing an enterprise to automatically check a device's compliance with security policy when it attaches to the network. Compliance checks might specify, for example, that critical security patches and antivirus software are installed and up-to-date.
Network Endpoint Assessment, endpoint security, security protocols, Internet, NEA
Steve Hanna, Susan Thomson, "NEA: Public Health for the Network", IEEE Internet Computing, vol.14, no. 3, pp. 77-80, May/June 2010, doi:10.1109/MIC.2010.72
1. P. Sangster et al., Network Endpoint Assessment (NEA): Overview and Requirements, IETF RFC 5209, June 2008;
2. T. Dierks and E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5246, Aug. 2008;
3. B. Aboba et al., Extensible Authentication Protocol (EAP), IETF RFC 3748, June 2004;
4. IEEE Standards for Local and Metropolitan Area Networks: Port-Based Network Access Control, IEEE standard 802.1X-2004, 2004.
5. P. Sangster and K. Narayan, A Posture Attribute (PA) Protocol Compatible with Trusted Network Connect (TNC), IETF RFC 5792, Mar. 2010;
6. R. Sahita et al., A Posture Broker (PB) Protocol Compatible with Trusted Network Connect (TNC), IETF RFC 5793, Mar. 2010;
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool