Wednesday 26 November 2008

Using E-mail at Risk

Electronic mail, often abbreviated to e-mail, email or originally eMail, is a store-and-forward method of writing, sending, receiving and saving messages over electronic communication systems. Email applies to the Internet e-mail system based on the Simple Mail Transfer Protocol, to network systems based on other protocols and to various mainframe, minicomputer, or internet by a particular systems vendor, or on the same protocols used on public networks.

Email Security Consist of 4 Major Risks which are Email Spoofing, Spreading Malwares, Email Bombing and Email Spamming.

Email Spoofing
Email spoofing is a kind of forgery. Mails appear to be sent from a known sender but they are actually not so. Spoofing involves forging the email headers, by altering the header information.

Spreading Malware
Malware is a form of computer code that is aimed at Internet users and results in unsolicited outcomes. Malicious codes such as Trojans, Virus and Worms spread fast via emails.

Email Bombing
It refers to transferring a huge amount of emails to victim, ensuing the victim's email account crash. An easy way of attaining this would be to subscribe the victim's email address to a huge number of mailing lists.

Email Spamming
It uses electronic communications medium to transmit unwanted messages to someone in bulk. The most common form of Spam is transmitted in the form of email as a form of the commercial advertising.

Using E-mail at Risk

Electronic mail, often abbreviated to e-mail, email or originally eMail, is a store-and-forward method of writing, sending, receiving and saving messages over electronic communication systems. Email applies to the Internet e-mail system based on the Simple Mail Transfer Protocol, to network systems based on other protocols and to various mainframe, minicomputer, or internet by a particular systems vendor, or on the same protocols used on public networks.

Email Security Consist of 4 Major Risks which are Email Spoofing, Spreading Malwares, Email Bombing and Email Spamming.

Email Spoofing
Email spoofing is a kind of forgery. Mails appear to be sent from a known sender but they are actually not so. Spoofing involves forging the email headers, by altering the header information.

Spreading Malware
Malware is a form of computer code that is aimed at Internet users and results in unsolicited outcomes. Malicious codes such as Trojans, Virus and Worms spread fast via emails.

Email Bombing
It refers to transferring a huge amount of emails to victim, ensuing the victim's email account crash. An easy way of attaining this would be to subscribe the victim's email address to a huge number of mailing lists.

Email Spamming
It uses electronic communications medium to transmit unwanted messages to someone in bulk. The most common form of Spam is transmitted in the form of email as a form of the commercial advertising.

Using E-mail at Risk

Electronic mail, often abbreviated to e-mail, email or originally eMail, is a store-and-forward method of writing, sending, receiving and saving messages over electronic communication systems. Email applies to the Internet e-mail system based on the Simple Mail Transfer Protocol, to network systems based on other protocols and to various mainframe, minicomputer, or internet by a particular systems vendor, or on the same protocols used on public networks.

Email Security Consist of 4 Major Risks which are Email Spoofing, Spreading Malwares, Email Bombing and Email Spamming.

Email Spoofing
Email spoofing is a kind of forgery. Mails appear to be sent from a known sender but they are actually not so. Spoofing involves forging the email headers, by altering the header information.

Spreading Malware
Malware is a form of computer code that is aimed at Internet users and results in unsolicited outcomes. Malicious codes such as Trojans, Virus and Worms spread fast via emails.

Email Bombing
It refers to transferring a huge amount of emails to victim, ensuing the victim's email account crash. An easy way of attaining this would be to subscribe the victim's email address to a huge number of mailing lists.

Email Spamming
It uses electronic communications medium to transmit unwanted messages to someone in bulk. The most common form of Spam is transmitted in the form of email as a form of the commercial advertising.

Lenovo Thinkpad X300 is an ultraportable masterpiece

Advantages: Lightweight; built-in DVD burner; dual cursor controllers; host of advanced features.

Useful feature are dedicated switches to turn on the notebook’s wireless LAN and Bluetooth connectivity.

It also has the usual Thinkpad features, including the blue backup button (Vantage) to restore the OS and applications in a jiffy, as well as the light switch (now in a brighter white LED) to comfortably see the keyboard when typing in the dark.

Additionally, there is a dedicated volume control button on top as well as keys to control the media player together with the function (Fn) key.

On the productivity side, the X300 performed as expected — the machine is able to run all the regular productivity apps, surf the Web, play DVDs and MP3s, as well as run photo-editing software on average performance.

When it comes to battery life, it did not disappoint either as we managed to squeeze out more than three hours on a single charge.

Additionally, the DVD burner powers off when not in use to conserve battery life.


Disadvantages: Pricey; no memory card reader, default OS is Windows Vista (currently known as the worst OS in the world) and it is hard to recustomize for other operating system such as Windows XP or Linux unless you run it using on VMware. As with most products, however, the X300 has its fair share of drawbacks.

For starters, the X300 does not come with a built-in Flash memory card reader, which is really a shame as it is one of the must-have features in today’s laptops.

Then, there is the RM9,588 price tag, which clearly means it is targeted at the high-end market.


Conclusion

Ultraportable notebooks usually sacrifice a lot especially for multiple externals ports to keep their slimness and stay lightweight, but the X300 is really in a class of its own. It is very useful for technical troubleshooting guy. It is not meant for multimedia purposes. For photo editing, it is still cannot compete with Mac Book Pro.

Still, if you are willing to look past some of the drawbacks, the X300 is an ideal choice for road warriors who are looking for the ultimate thin and light notebook without sacrificing much of the features they need to be productive. 


THINKPAD X300 Default Specification

Ultraportable notebook

Processor: Intel Core 2 Duo processor SL7100 (1.2GHz, 4MB, 800MHz FSB)
Memory: 2GB DDR2 RAM
Graphics: Intel Graphics Media Accelerator X3100
Display: 13.3in with LED backlight (1,440 x 900pixels)
Storage: 64GB Solid State SATA Drive
Connectivity: WiFi, 10/100 Ethernet, 56k modem, Bluetooth
I/O ports: Three USB 2.0 ports, legacy ports.
Operating System: Microsoft Windows Vista Business
Battery: Lithium-polymer
Other features: Ultrathin DVD burner, built-in webcam, biometric fingerprint reader, TrackPoint and TrackPad combo
Dimensions (w x d x h): 318 x 231 x 23.4mm
Weight: 1.42kg

Lenovo Thinkpad X300 is an ultraportable masterpiece

Advantages: Lightweight; built-in DVD burner; dual cursor controllers; host of advanced features.

Useful feature are dedicated switches to turn on the notebook’s wireless LAN and Bluetooth connectivity.

It also has the usual Thinkpad features, including the blue backup button (Vantage) to restore the OS and applications in a jiffy, as well as the light switch (now in a brighter white LED) to comfortably see the keyboard when typing in the dark.

Additionally, there is a dedicated volume control button on top as well as keys to control the media player together with the function (Fn) key.

On the productivity side, the X300 performed as expected — the machine is able to run all the regular productivity apps, surf the Web, play DVDs and MP3s, as well as run photo-editing software on average performance.

When it comes to battery life, it did not disappoint either as we managed to squeeze out more than three hours on a single charge.

Additionally, the DVD burner powers off when not in use to conserve battery life.


Disadvantages: Pricey; no memory card reader, default OS is Windows Vista (currently known as the worst OS in the world) and it is hard to recustomize for other operating system such as Windows XP or Linux unless you run it using on VMware. As with most products, however, the X300 has its fair share of drawbacks.

For starters, the X300 does not come with a built-in Flash memory card reader, which is really a shame as it is one of the must-have features in today’s laptops.

Then, there is the RM9,588 price tag, which clearly means it is targeted at the high-end market.


Conclusion

Ultraportable notebooks usually sacrifice a lot especially for multiple externals ports to keep their slimness and stay lightweight, but the X300 is really in a class of its own. It is very useful for technical troubleshooting guy. It is not meant for multimedia purposes. For photo editing, it is still cannot compete with Mac Book Pro.

Still, if you are willing to look past some of the drawbacks, the X300 is an ideal choice for road warriors who are looking for the ultimate thin and light notebook without sacrificing much of the features they need to be productive. 


THINKPAD X300 Default Specification

Ultraportable notebook

Processor: Intel Core 2 Duo processor SL7100 (1.2GHz, 4MB, 800MHz FSB)
Memory: 2GB DDR2 RAM
Graphics: Intel Graphics Media Accelerator X3100
Display: 13.3in with LED backlight (1,440 x 900pixels)
Storage: 64GB Solid State SATA Drive
Connectivity: WiFi, 10/100 Ethernet, 56k modem, Bluetooth
I/O ports: Three USB 2.0 ports, legacy ports.
Operating System: Microsoft Windows Vista Business
Battery: Lithium-polymer
Other features: Ultrathin DVD burner, built-in webcam, biometric fingerprint reader, TrackPoint and TrackPad combo
Dimensions (w x d x h): 318 x 231 x 23.4mm
Weight: 1.42kg

Lenovo Thinkpad X300 is an ultraportable masterpiece

Advantages: Lightweight; built-in DVD burner; dual cursor controllers; host of advanced features.

Useful feature are dedicated switches to turn on the notebook’s wireless LAN and Bluetooth connectivity.

It also has the usual Thinkpad features, including the blue backup button (Vantage) to restore the OS and applications in a jiffy, as well as the light switch (now in a brighter white LED) to comfortably see the keyboard when typing in the dark.

Additionally, there is a dedicated volume control button on top as well as keys to control the media player together with the function (Fn) key.

On the productivity side, the X300 performed as expected — the machine is able to run all the regular productivity apps, surf the Web, play DVDs and MP3s, as well as run photo-editing software on average performance.

When it comes to battery life, it did not disappoint either as we managed to squeeze out more than three hours on a single charge.

Additionally, the DVD burner powers off when not in use to conserve battery life.


Disadvantages: Pricey; no memory card reader, default OS is Windows Vista (currently known as the worst OS in the world) and it is hard to recustomize for other operating system such as Windows XP or Linux unless you run it using on VMware. As with most products, however, the X300 has its fair share of drawbacks.

For starters, the X300 does not come with a built-in Flash memory card reader, which is really a shame as it is one of the must-have features in today’s laptops.

Then, there is the RM9,588 price tag, which clearly means it is targeted at the high-end market.


Conclusion

Ultraportable notebooks usually sacrifice a lot especially for multiple externals ports to keep their slimness and stay lightweight, but the X300 is really in a class of its own. It is very useful for technical troubleshooting guy. It is not meant for multimedia purposes. For photo editing, it is still cannot compete with Mac Book Pro.

Still, if you are willing to look past some of the drawbacks, the X300 is an ideal choice for road warriors who are looking for the ultimate thin and light notebook without sacrificing much of the features they need to be productive. 


THINKPAD X300 Default Specification

Ultraportable notebook

Processor: Intel Core 2 Duo processor SL7100 (1.2GHz, 4MB, 800MHz FSB)
Memory: 2GB DDR2 RAM
Graphics: Intel Graphics Media Accelerator X3100
Display: 13.3in with LED backlight (1,440 x 900pixels)
Storage: 64GB Solid State SATA Drive
Connectivity: WiFi, 10/100 Ethernet, 56k modem, Bluetooth
I/O ports: Three USB 2.0 ports, legacy ports.
Operating System: Microsoft Windows Vista Business
Battery: Lithium-polymer
Other features: Ultrathin DVD burner, built-in webcam, biometric fingerprint reader, TrackPoint and TrackPad combo
Dimensions (w x d x h): 318 x 231 x 23.4mm
Weight: 1.42kg

Monday 24 November 2008

WiMAX Roaming Check List

As a first step to enable roaming, two WiMAX operators which desire to provide roaming service on each others’ networks must share information about their specific requirements and capabilities. This is an important step in determining whether their networks will support roaming services for each others’ subscribers. This includes information regarding frequency bands, devices, services and protocols. For example, devices of a WiMAX operator must be capable of operating on the frequencies and within the channel bands of their roaming partner. Two operators must also agree on services to be provided, IP address assignment mechanism, method of interconnection and the format and method for sharing information to track subscriber usage and to exchange information required for billing and settlement.
The following is a check list of items to be completed in order to implement roaming.
  1. Identify and contact roaming partners.
  2. Operator Information – to be shared with potential roaming partners to determine compatibility for roaming (see list below).
  3. Decide whether roaming will be through a direct connection with the roaming partner or via a third-party roaming exchange provider (WRX). If through a WRX, establish relationship with WRX provider.
  4. Use WiMAX Roaming Guidelines and Roaming Specifications as reference in ensuring your network is roaming capable.
  5. Establish a Roaming Agreement with roaming partner. (Roaming Agreement Template)
  6. Establish connectivity with roaming partner.
  7. Test roaming service (Test Plan).
  8. Begin service.

WiMAX Roaming Check List

As a first step to enable roaming, two WiMAX operators which desire to provide roaming service on each others’ networks must share information about their specific requirements and capabilities. This is an important step in determining whether their networks will support roaming services for each others’ subscribers. This includes information regarding frequency bands, devices, services and protocols. For example, devices of a WiMAX operator must be capable of operating on the frequencies and within the channel bands of their roaming partner. Two operators must also agree on services to be provided, IP address assignment mechanism, method of interconnection and the format and method for sharing information to track subscriber usage and to exchange information required for billing and settlement.
The following is a check list of items to be completed in order to implement roaming.
  1. Identify and contact roaming partners.
  2. Operator Information – to be shared with potential roaming partners to determine compatibility for roaming (see list below).
  3. Decide whether roaming will be through a direct connection with the roaming partner or via a third-party roaming exchange provider (WRX). If through a WRX, establish relationship with WRX provider.
  4. Use WiMAX Roaming Guidelines and Roaming Specifications as reference in ensuring your network is roaming capable.
  5. Establish a Roaming Agreement with roaming partner. (Roaming Agreement Template)
  6. Establish connectivity with roaming partner.
  7. Test roaming service (Test Plan).
  8. Begin service.

WiMAX Roaming Check List

As a first step to enable roaming, two WiMAX operators which desire to provide roaming service on each others’ networks must share information about their specific requirements and capabilities. This is an important step in determining whether their networks will support roaming services for each others’ subscribers. This includes information regarding frequency bands, devices, services and protocols. For example, devices of a WiMAX operator must be capable of operating on the frequencies and within the channel bands of their roaming partner. Two operators must also agree on services to be provided, IP address assignment mechanism, method of interconnection and the format and method for sharing information to track subscriber usage and to exchange information required for billing and settlement.
The following is a check list of items to be completed in order to implement roaming.
  1. Identify and contact roaming partners.
  2. Operator Information – to be shared with potential roaming partners to determine compatibility for roaming (see list below).
  3. Decide whether roaming will be through a direct connection with the roaming partner or via a third-party roaming exchange provider (WRX). If through a WRX, establish relationship with WRX provider.
  4. Use WiMAX Roaming Guidelines and Roaming Specifications as reference in ensuring your network is roaming capable.
  5. Establish a Roaming Agreement with roaming partner. (Roaming Agreement Template)
  6. Establish connectivity with roaming partner.
  7. Test roaming service (Test Plan).
  8. Begin service.

Introduction to Basic Router Definition

According to my trainer, when I'm taking ESNA class, Mr. Raj said Routers is something (software or hardware) that usually used to join or connect two or more logical subnets, which do not necessarily map one-to-one to the physical interfaces of the router. Router usually tailored to the tasks of routing and forwarding information.

Physically, Routers contain a specialized operating system such as Cisco's IOS. Router component consist of RAM, ROM, NVRAM, flash memory, and one or more processors (CPU), as well as two or more network interfaces. Router generally provides connectivity inside enterprises, between enterprises and the Internet, and inside Internet Service Providers (ISP).

Router have four different modes. The first mode is user mode, then we have privileged mode. For more deeper, we can go to global configuration mode which is used to change the configuration. The final mode is specific configuration mode.

mode 1: Router>
mode 2: Router#
mode 3: Router-config#
mode 4: Router-config-specific#


Router provides two routing types which are static routing and dynamic routing. Static routing used to reduce overhead and for security while in dynamic routing information is learned from other routers and routing protocols adjust routes automatically. Static routing does not have the scalability compared to dynamic routing. For now, these are the basic introduction about Router that I can review for the time being. Later on, for other detail information about router, I'll post it next time.

adios,

Introduction to Basic Router Definition

According to my trainer, when I'm taking ESNA class, Mr. Raj said Routers is something (software or hardware) that usually used to join or connect two or more logical subnets, which do not necessarily map one-to-one to the physical interfaces of the router. Router usually tailored to the tasks of routing and forwarding information.

Physically, Routers contain a specialized operating system such as Cisco's IOS. Router component consist of RAM, ROM, NVRAM, flash memory, and one or more processors (CPU), as well as two or more network interfaces. Router generally provides connectivity inside enterprises, between enterprises and the Internet, and inside Internet Service Providers (ISP).

Router have four different modes. The first mode is user mode, then we have privileged mode. For more deeper, we can go to global configuration mode which is used to change the configuration. The final mode is specific configuration mode.

mode 1: Router>
mode 2: Router#
mode 3: Router-config#
mode 4: Router-config-specific#


Router provides two routing types which are static routing and dynamic routing. Static routing used to reduce overhead and for security while in dynamic routing information is learned from other routers and routing protocols adjust routes automatically. Static routing does not have the scalability compared to dynamic routing. For now, these are the basic introduction about Router that I can review for the time being. Later on, for other detail information about router, I'll post it next time.

adios,

Introduction to Basic Router Definition

According to my trainer, when I'm taking ESNA class, Mr. Raj said Routers is something (software or hardware) that usually used to join or connect two or more logical subnets, which do not necessarily map one-to-one to the physical interfaces of the router. Router usually tailored to the tasks of routing and forwarding information.

Physically, Routers contain a specialized operating system such as Cisco's IOS. Router component consist of RAM, ROM, NVRAM, flash memory, and one or more processors (CPU), as well as two or more network interfaces. Router generally provides connectivity inside enterprises, between enterprises and the Internet, and inside Internet Service Providers (ISP).

Router have four different modes. The first mode is user mode, then we have privileged mode. For more deeper, we can go to global configuration mode which is used to change the configuration. The final mode is specific configuration mode.

mode 1: Router>
mode 2: Router#
mode 3: Router-config#
mode 4: Router-config-specific#


Router provides two routing types which are static routing and dynamic routing. Static routing used to reduce overhead and for security while in dynamic routing information is learned from other routers and routing protocols adjust routes automatically. Static routing does not have the scalability compared to dynamic routing. For now, these are the basic introduction about Router that I can review for the time being. Later on, for other detail information about router, I'll post it next time.

adios,

Wednesday 19 November 2008

Motorola vs Aruba - Patent infringement

Last year somewhere in August 2007, Motorola and his subsidiaries Symbol and Wireless Valley sues Aruba Networks for alleged patent infringement. Then last two months somewhere in September 2008, Aruba files patent infringement countersuit against Motorola, Symbol, and Wireless Valley. The battle still not ended yet. For me, as an end-users who have experience with Motorola-Symbol technology and Aruba technology... a secured wireless technology always synonym to Aruba enterprise solution. Even if we compare to another wireless leader in the market such as Cisco, they have to admit that Aruba technology offers a total solution for secure wireless environment. they offer wireless firewall, VPN etc in one box.


I consider, it is a weird story to hear Motorola also has the capability to offer better wireless solution. As far as I’m concern, the most well known wireless leader being debated among the wireless administrator is between Cisco and Aruba. I don’t agree if someone said that, Motorola-Symbol is another competitor in the wireless market share. Solution from Trapeze, 3Com, Meru or Orinoco which I can considered much better compared to Motorola-Symbol solution. For me, it is a wired story when Motorola sues Aruba for alleged patent infringement. My favorite wireless products rank is listed as below according to its best features offered to the end-users.

1. Aruba
2. Cisco
3. Trapeze/3Com
4. Meru
5. Orinoco
6. Motorola
7. Belkin
8. Colubris
9. Linksys

Motorola vs Aruba - Patent infringement

Last year somewhere in August 2007, Motorola and his subsidiaries Symbol and Wireless Valley sues Aruba Networks for alleged patent infringement. Then last two months somewhere in September 2008, Aruba files patent infringement countersuit against Motorola, Symbol, and Wireless Valley. The battle still not ended yet. For me, as an end-users who have experience with Motorola-Symbol technology and Aruba technology... a secured wireless technology always synonym to Aruba enterprise solution. Even if we compare to another wireless leader in the market such as Cisco, they have to admit that Aruba technology offers a total solution for secure wireless environment. they offer wireless firewall, VPN etc in one box.


I consider, it is a weird story to hear Motorola also has the capability to offer better wireless solution. As far as I’m concern, the most well known wireless leader being debated among the wireless administrator is between Cisco and Aruba. I don’t agree if someone said that, Motorola-Symbol is another competitor in the wireless market share. Solution from Trapeze, 3Com, Meru or Orinoco which I can considered much better compared to Motorola-Symbol solution. For me, it is a wired story when Motorola sues Aruba for alleged patent infringement. My favorite wireless products rank is listed as below according to its best features offered to the end-users.

1. Aruba
2. Cisco
3. Trapeze/3Com
4. Meru
5. Orinoco
6. Motorola
7. Belkin
8. Colubris
9. Linksys

Motorola vs Aruba - Patent infringement

Last year somewhere in August 2007, Motorola and his subsidiaries Symbol and Wireless Valley sues Aruba Networks for alleged patent infringement. Then last two months somewhere in September 2008, Aruba files patent infringement countersuit against Motorola, Symbol, and Wireless Valley. The battle still not ended yet. For me, as an end-users who have experience with Motorola-Symbol technology and Aruba technology... a secured wireless technology always synonym to Aruba enterprise solution. Even if we compare to another wireless leader in the market such as Cisco, they have to admit that Aruba technology offers a total solution for secure wireless environment. they offer wireless firewall, VPN etc in one box.


I consider, it is a weird story to hear Motorola also has the capability to offer better wireless solution. As far as I’m concern, the most well known wireless leader being debated among the wireless administrator is between Cisco and Aruba. I don’t agree if someone said that, Motorola-Symbol is another competitor in the wireless market share. Solution from Trapeze, 3Com, Meru or Orinoco which I can considered much better compared to Motorola-Symbol solution. For me, it is a wired story when Motorola sues Aruba for alleged patent infringement. My favorite wireless products rank is listed as below according to its best features offered to the end-users.

1. Aruba
2. Cisco
3. Trapeze/3Com
4. Meru
5. Orinoco
6. Motorola
7. Belkin
8. Colubris
9. Linksys

Sunday 9 November 2008

Overview of Dynamic NAC Features

Combine the strengths of Infrastructure NAC with an easy to deploy software approach
. Compliant PC’s act like “Neighborhood Watch”
. The existing normal PC’s become the infrastructure (enforcers) to quarantine rogues
. Enforcers manage ARP to control and limit a Rogue ability to send/receive traffic on the network
. Enforcers watch for new endpoints, using ARP redirection to protect the network and community

DNAC Strengths
. Zero network upgrades or changes (Low TCO)
. Scales cost effectively across multiple subnets
. Authentication agnostic (Windows Domain, 802.1x, other)
. Friendly fail-open design
. Extremely responsive quarantine and remediation mechanisms

These are the comparison that we can see between Tradional NAC and Software Based NAC

Traditional Infrastructure based

Software based

In-line NAC

Cisco NAC V1 V2

802.1x NAC

Host based NAC (CAF)

Dynamic NAC

Enforcement Type

Appliance in line

Switch based

Client Self enforcement

Other compliant PC’s

Supports LAN Enforcement

Yes – but requires multiple appliances

YES

YES

YES

Supports Remote Access VPN’s

YES

NO

YES

NO

Network needs

Re-architecting

YES

Extensive

None

None

Detects Rogue Users \ Devices

NO

YES

NO

YES


. Traditional Infrastructure NAC is too difficult to deploy. Too many switch NAC need to deploy for a large scale deployment.
. Software NAC solutions are easy to deploy and have many key weaknesses
. The DNAC solution method offers a hybrid approach – Strong enforcement with ease of installation. It doesn't involve any re-achitecting the exsting network infrastructure.

Dynamic NAC and Infrastructure NAC comparison

DNAC

DNAC + 802.1x authentication

Infrastructure NAC

Client Software

DNAC Client

DNAC Client + Supplicant

NAC client +
Supplicant

Server Software

Policy server

RADIUS server + policy server

RADIUS server +
policy server

Minimum switch requirements

-

802.1x authentication

802.1x authentication
with VLAN assignment

Ongoing port config

-

Config 802.1x ports

Config 802.1x ports

Ongoing switch config

-

-

New VLAN and subnet, router ACL, DHCP, RADIUS

One time network Reconfiguration

-

-

New VLANs and subnets, router ACL, DHCP, RADIUS, RADIUS VLAN assignment


One time network configuration and ongoing switch config are generally difficult to deploy since it involve configuration for Radius server, DHCP server and VLAN subnetting.

For 802.1x implementions, it is considered as an acceptable method for most NAC deployment. It offers better security enforment and easy to deploy.

Client and server software based considered as normal acceptable deployment.