IBM Tivoli and Cisco User Manual page 43

Building a network access control solution with ibm tivoli and cisco systems
Table of Contents

Advertisement

This requirement can be fulfilled by providing each user with a unique identity
and verifying it even before the posture condition of a client is checked. This
process was standarized with the IEEE 802.1x protocol, and IBM provides the
solution to facilitate it. IBM Tivoli Identity Manager delivers a flexible provisioning
engine to create and manage user accounts on the Secure Access Control
Server. For more information, contact your IBM representative.
Remediation process
remediation process
The
of the IBM Integrated Security Solution for Cisco Networks. The role of this
process is to provide the noncompliant client with a means to become compliant
again and thus providing access to the network.
The remediation process is facilitated by the following components:
Remediation handler
remediation handler
The
of noncompliant settings from the compliance client, then asks the
remediation server to provide the new software or the correct settings as
required by the security policy. In the presented solution, each compliance
check performed by the compliance agent is associated with a related
remediation object
compliant.
Remediation server
remediation server
The
for the clients. It listens to the clients' requests and responds to them. The
response may include a number of elements, for example:
– Installing the software package on the client
– Starting or stopping a service on the client
– Changing software settings on the client
Remediation object
remediation object
The
the client to become compliant again. For example, the object for recovering
from an outdated virus definition file would include the new virus definition file
and would automatically install it.
Depending on the conditions and security policy requirements, objects can be
more or less complex.
, either HTML-assisted or automated, is an integral part
initiates the remediation process. It receives the list
that is capable of correcting the client posture if it is not
provides the approved compliant settings templates
includes the required software and scripts required for
Chapter 2. Architecting the solution
25

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network access control solution

Table of Contents