Ead Configuration; Introduction To Ead; Typical Network Application Of Ead - H3C S5600 Series Operation Manual

Hide thumbs Also See for S5600 Series:
Table of Contents

Advertisement

3

EAD Configuration

Introduction to EAD

Endpoint (EAD) is an attack defense solution. Using this solution, you can enhance the active defense
capability of network endpoints, prevents viruses and worms from spreading on the network, and
protects the entire network by limiting the access rights of insecure endpoints.
With the cooperation of switch, AAA sever, security policy server and security client, EAD is able to
evaluate the security compliance of network endpoints and dynamically control their access rights.
With EAD, a switch:
Verifies the validity of the session control packets it receives according to the source IP addresses
of the packets: It regards only those packets sourced from authentication or security policy server
as valid.
Dynamically adjusts the VLAN, rate, packet scheduling priority and Access Control List (ACL) for
user terminals according to session control packets, whereby to control the access rights of users
dynamically.

Typical Network Application of EAD

EAD checks the security status of users before they can access the network, and forcibly implements
user access control policies according to the check results. In this way, it can isolate the users that are
not compliant with security standard and force these users to update their virus databases and install
system patches.
Figure 3-1 Typical network application of EAD
Virus patch server
Supplicant
After a client passes the authentication, the security Client (software installed on the client PC) interacts
with the security policy server to check the security status of the client. If the client is not compliant with
the security standard, the security policy server issues an ACL to the switch, which then inhibits the
client from accessing any parts of the network except for the virus/patch server.
Figure 3-1
shows a typical network application of EAD.
Authentication server
Security policy server
3-1

Hide quick links:

Advertisement

Chapters

Table of Contents
loading

This manual is also suitable for:

S5600-26cS5600-26c-pwrS5600-26fS5600-50cS5600-50c-pwr

Table of Contents