TAILIEUCHUNG - cisco migration_Network Virtualization—Network Admission

This document provides network architects with a general understanding of how to leverage network virtualization to make a centralized NAC Appliance deployment easier. This document allows the network architect to select a design and reference the specific implementation details in the associated design guides. The foundation technologies associated with enterprise network virtualization architecture are divided into the following three functional areas: • Access control • Path isolation • Services edge. | Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control NAC Appliance for their campus users. Two solutions for Network Admission Control are proposed and analyzed in this document at both the architectural and functional levels. For related information see the following documents Network Virtualization Access Control Design Guide OL-13634-01 Network Virtualization Guest and Partner Access Deployment Guide OL-13635-01 Network Virtualization Services Edge Design Guide OL-13637-01 Network Virtualization Path Isolation Design Guide OL-13638-01 Contents Introduction 1 Business Problem 2 End-to-End Network Virtualization Solution 3 End-to-End Overview 3 User Authentication and Access 4 Path Isolation 4 Services Edge 6 Network Virtualization Deployment Scenarios 6 Network Admission Control Option A 6 Access Control 7 Path Isolation 8 Services Edge 10 Network Admission Control Option B 11 Access Control 11 111 111 CISCO. Americas Headquarters Cisco Systems Inc. 170 West Tasman Drive San Jose CA 95134-1706 USA 2007 Cisco Systems Inc. All rights reserved. Introduction Path Isolation 12 Services Edge 12 Introduction This document provides network architects with a general understanding of how to leverage network virtualization to make a centralized NAC Appliance deployment easier. This document allows the network architect to select a design and reference the specific implementation details in the associated design guides. The foundation technologies associated with enterprise network virtualization architecture are divided into the following three functional areas Access control Path isolation Services edge Several technologies and techniques can be used to provide the functionality required in each area. Rather than attempting to provide detailed information for every available technology option within the scope of this document a separate set of design guides

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.