某钢铁端点准入防御方案技术建议书目录1概述..................................................................................................................42EAD端点准入防御解决方案介绍.................................................................52.1方案思路...............................................................................................52.2方案组成部分.......................................................................................52.2.1EAD安全策略服务器..................................................................62.2.2修复服务器...................................................................................72.2.3安全联动设备...............................................................................72.2.4安全客户端...................................................................................73EAD解决方案组网部署.................................................................................83.1多厂商设备混合组网部署(Portal方式)........................................9方案组网................................................................................................10组网设备................................................................................................10方案说明................................................................................................10流程说明................................................................................................11实施效果................................................................................................113.2接入层准入控制组网部署(802.1x)..............................................11方案组网................................................................................................11组网设备................................................................................................12方案说明................................................................................................12流程说明................................................................................................13实施效果................................................................................................133.3EAD应用模式....................................................................................143.3.1隔离模式.....................................................................................143.3.2Guest模式..................................................................................143.3.3VIP模式......................................................................................153.3.4下线模式.....................................................................................154EAD解决方案应用模型及功能特点...........................................................164.1端点准入防御应用模型.....................................................................164.1.1端点准入防御应用模型.............................................................164.1.2端点准入防御工作流程.............................................................164.2端点准入防御功能特点.....................................................................174.2.1安全状态评估.............................................................................174.2.2用户权限管理.............................................................................184.2.3用户行为监...