What about "post-traffic police" and/or "post-re-checking" without
kicking user and machine out by clearing "Certified Device List"?
David Wang Networking Services, CCS
www.uoguelph.ca 519-824-4120 ext 52046
On 10-Feb-09, at 12:22 PM, Dennis Xu wrote:
We want to have an option in filter list for: require login, bypass
posture assessment
We have a requirement that some devices in the filter require
authentication, but need to bypass posture assessment.
Dennis Xu
Network Analyst
Computing and Communication Services
University of Guelph
5198244120 x 56217
----- Original Message -----
From: "Daniel Sichel" <[email protected]>
To: [email protected]
Sent: Tuesday, February 10, 2009 12:03:02 PM GMT -05:00 US/Canada
Eastern
Subject: Wish list
4) Have the agent run as a service and/or run before the windows
logon
portion of boot up. So basically the agent could load, verify the
posture of the computer
Amen to that. Have the CAS actually proxy the authentication process
and
hand the Kerberos ticket(s) to the machine only when fully remediated.
Also, have a backround process triggered after remediation and
authentication to allow roaming profiles to work. Even having to sit
through a "Please wait, Clean Access is checking your machine."
would be
fine, if log in would then work like normal.
The Cisco solution for roaming profiles is to allow unremediated
clients
FULL ACCESS TO THEIR PROFILE SHARES. Am I the only one on crazy pills
here? I thought one of the major features of this system was the
ability
to deny access to sensitive network assets until clients are
remediated.
Right now I have to allow netbios and authentication access to my
domain
controllers to anyone, and as I mentioned, if I want roaming profiles,
all my most sensitive shares. I am starting to think just doing
Nessus,
Nagios, or Snort connected with a script to shut down offending
ports on
my switches would be a better solution than Clean Access. No other
Cisco
product mandates a permissive policy like this of allow then deny. Any
security pro knows you deny, verify, authenticate, remediate, then
(and
only then) allow access.
Dan Sichel
Ponderosa Telephone