Hi,
I am working on a RFP and need advice on the below points which should be supported by Juniper UAC. Please let me know if the below features and/or requirements can be met by Juniper UAC.Please note : THIS WILL BE A AGENTLESS DEPLOYMENT
1.Provide tracking of what devices were on the network,where,when
2. Provice live inventory of devices which can be linked to static inventory
3.Support for handling virtual systems
4.Scripts to assist in the initial import of systems from a CSV file
5.An option which can be used to disable NAC and configure static VLANs on switch ports
6.Scan by host-name,IP address or network range
7.Scan based on Vulnerability group/s
8.Security information of an asset or group/s at a glance
9.Ability to create a pie-charts depicting vulnerability risk percentage
10.Provice remediation solution for dectected vulnerabilities
Would be great help if someone can assist on the above.
Thanks.
See responses in line:1.Provide tracking of what devices were on the network,where,when
As long as the device sends a radius accounting start and stop message to the IC, we can track sessions.
2. Provice live inventory of devices which can be linked to static inventory
We will show active sessions on the IC admin page.
3.Support for handling virtual systems
Please define virtual systems in this context.
4.Scripts to assist in the initial import of systems from a CSV file
CSV is not aupported for import / export of IC configurations. We do support XML as well as a PUSH technology for larger deployments. Addtionally, UAC will work with the Juniper NSM management servers for large deployments.
5.An option which can be used to disable NAC and configure static VLANs on switch ports
UAC can issue radius attributes to assign VLANs dynamicly. Not sure what you mean by disabling NAC. If you do not want ot use NAC then this would be a configuration setting on the switch or access point.
6.Scan by host-name,IP address or network range
Please define "scan" Do you mean limit access to resources based on host-name, ip address or network range? If so, UAC can do this.
7.Scan based on Vulnerability group/s
We incorporate the Shavlik patch management system in UAC and can limit access to resources based on the results of the Shavlik scan. Also, UAC can tie into the Juniper IDP product family and limit access to the network if the workstation is breaking corporate use policies as defined on the Juniper IDP sensors.
8.Security information of an asset or group/s at a glance
Not a feature in UAC
9.Ability to create a pie-charts depicting vulnerability risk percentage
Not a feature in UAC
10.Provice remediation solution for dectected vulnerabilities
If a user fails a host check, we can provision a Layer 2 switch to put the user into a remediation VLAN. Additionally, via our OPSWAT support, we can initiate Virus Definition updates, system scans, start services and so on.
Would be great help if someone can assist on the above.
Thanks.
In the future, RFP questions should be directed to our sales team. They can sit down with ou and go over every detail and answer any questions you may have.
Hope this helps
Thanks
Craig