Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


14.2 Operating a quarantine system linked to an authentication server

You can operate a quarantine system linked to an authentication server in any of the following ways:

The following subsections provide operation examples for two of these: IEEE 802.1X authentication used in a dynamic VLAN environment and MAC authentication used in a static VLAN environment.

Organization of this section
14.2.1 Example of operating a quarantine system linked to an authentication server in a dynamic VLAN environment (IEEE 802.1X authentication)
14.2.2 Example of operating a quarantine system linked to an authentication server in a static VLAN environment (MAC authentication)
14.2.3 Tasks during operation of a quarantine system linked to an authentication server
14.2.4 Managing the connection control list
14.2.5 Implementing security measures on a client
14.2.6 Adding a new client to the network
14.2.7 Removing clients after operation has started
14.2.8 Managing network connection histories for clients

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated