Important Notice: Our web hosting provider recently started charging us for additional visits, which was unexpected. In response, we're seeking donations. Depending on the situation, we may explore different monetization options for our Community and Expert Contributors. It's crucial to provide more returns for their expertise and offer more Expert Validated Answers or AI Validated Answers. Learn more about our hosting issue here.

How does the architecture work? What are some key elements?

Architecture elements key
0
Posted

How does the architecture work? What are some key elements?

0

The TNC architecture is constructed on top of traditional network access architecture – for instance, the switches in a wired LAN. A Network Access Requester (NAR) is client software on the endpoint that begins the network access attempt. 802.1x supplicants, VPN clients or Web browsers initiating SSL connections could all be NARs in a TNC environment. The Policy Enforcement Point (PEP) – usually a network infrastructure device like a switch or a VPN concentrator – is configured to require 802.1X authentication, and forwards information about the NAR and its network connection attempt to a Policy Decision Point (PDP), where a Network Access Authority (NAA) determines whether the endpoint should be admitted to the network. The TNC extends this standard architecture with two layers on the endpoint and two layers on the PDP. On the endpoint, a TNC Client gathers reports from Integrity Measurement Collectors (IMCs, plug-in modules that report on the endpoint’s health). The TNC client delive

0

Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:”Table Normal”; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:””; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:”Times New Roman”; mso-ansi-language:#0400; mso-fareast-language:#0400; mso-bidi-language:#0400;} The TNC architecture is constructed on top of traditional network access architecture – for instance, the switches in a wired LAN. A Network Access Requester (NAR) is client software on the endpoint that begins the network access attempt. 802.1x supplicants, VPN clients or Web browsers initiating SSL connections could all be NARs in a TNC environment. The Policy Enforcement Point (PEP) – usually a network infrastructure device like a switch or a VPN concentrator – is configured to require 802.1X authentication, and forw

Related Questions

What is your question?

*Sadly, we had to bring back ads too. Hopefully more targeted.

Experts123