{"id":117,"date":"2021-01-26T11:00:33","date_gmt":"2021-01-26T08:00:33","guid":{"rendered":"http:\/\/www.armitek.com.tr\/?page_id=117"},"modified":"2026-02-10T11:07:58","modified_gmt":"2026-02-10T08:07:58","slug":"urunlerimiz","status":"publish","type":"page","link":"http:\/\/www.armitek.com.tr\/?page_id=117","title":{"rendered":"\u00dcr\u00fcnlerimiz"},"content":{"rendered":"\n<h3>LimRAD NAC A\u011f Eri\u015fim Kontrol Sistemi<\/h3>\n\n\n\n<p>A\u011f Eri\u015fim Kontrol\u00fc network g\u00fcvenli\u011finin ilk ad\u0131m\u0131 en basiti ama en etkili y\u00f6ntemlerinden biridir. Eri\u015fim denetimi ile a\u011f \u00fczerinde izin verilmeyen hi\u00e7bir istemci ve kullan\u0131c\u0131 bulunamaz.<\/p>\n\n\n\n<p>A\u011f Eri\u015fim Kontrol\u00fc 802.1x protokol\u00fc kullan\u0131larak a\u011fa dahil olmak isteyen kullan\u0131c\u0131 bilgisayarlar\u0131n\u0131n MAC adresleri kullan\u0131larak yap\u0131l\u0131r. A\u011f Eri\u015fim Kontrol\u00fc, yetki ve izin denetimlerini kimlik ve eri\u015fim y\u00f6netimi olarak adland\u0131r\u0131lan identity&nbsp; ve access management (IAM) bile\u015feni \u00fczerinden yapar. IAM\u2019in sa\u011flad\u0131\u011f\u0131 izin bilgilerinin ve \u00f6nceden belirlenmi\u015f kurallar\u0131n yard\u0131m\u0131yla A\u011f Eri\u015fim Kontrol\u00fc a\u011fa gelen eri\u015fim isteklerini kabul veya red eder.<\/p>\n\n\n\n<p>LimRAD NAC\u00a0\u00e7\u00f6z\u00fcm\u00fc ilk uyguland\u0131\u011f\u0131nda, a\u011fa o anda eri\u015fmekte olan t\u00fcm cihazlar\u0131 bulmak, ne t\u00fcr cihazlar oldu\u011funu saptamak, kurumun belirledi\u011fi politikalara g\u00f6re bu cihazlarla ilgili ne t\u00fcr bir i\u015flem yap\u0131laca\u011f\u0131n\u0131 belirlemek gibi s\u00fcre\u00e7leri i\u015fletir. A\u011f Eri\u015fim Kontrol\u00fc sistemleri genel olarak geni\u015f bir \u00fcr\u00fcn listesine ait kurallar\u0131 ve izinleri belirlemeyi sa\u011flayan ince ayarlar\u0131 i\u00e7erir.<\/p>\n\n\n\n<p>\u200bA\u011f Eri\u015fim Kontrol\u00fcpre-admission ve post-admission olmak \u00fczere iki \u015fekilde uygulanabilir. Pre-admission kullan\u0131c\u0131n\u0131n \u00f6n izinle a\u011fa dahil olup olmayaca\u011f\u0131na karar verilmesi i\u015flemidir. Reddedilen kullan\u0131c\u0131lar a\u011fa dahil edilmeden reddedilirler. Post-admission ise kullan\u0131c\u0131 a\u011fa d\u00e2hil edildikten sonra hangi haklara sahipse o haklar kar\u015f\u0131l\u0131\u011f\u0131nda izin verilen uygulamalara eri\u015febilir durumda olur.<\/p>\n\n\n\n<h4>\u200b<strong>A\u011f Eri\u015fim Kontrol\u00fcn\u00fcn \u00f6nemli \u00f6zellikleri ve faydalar\u0131:<\/strong><\/h4>\n\n\n\n<ul><li>Ayr\u0131 bir cihaz veya mod\u00fcl gerektirmeden i\u015flem yapan t\u00fcm sistemlere belirlenen kurallar\u0131 zorunlu k\u0131lar.<\/li><li>Herhangi bir ZeroDay sald\u0131r\u0131s\u0131na kar\u015f\u0131 \u00f6nlemdir,<\/li><li>Kullan\u0131c\u0131lar\u0131n ve cihazlar\u0131n\u0131n tan\u0131nmas\u0131n\u0131 ve profil \u00e7\u0131kar\u0131lmas\u0131n\u0131 yetkilendirilmesini sa\u011flar.<\/li><li>Konuk (Guest) kullan\u0131c\u0131lar\u0131n a\u011f eri\u015fimini kontrol i\u00e7in konuk kullan\u0131c\u0131 kayd\u0131, kimlik do\u011frulamas\u0131 gibi \u00f6nlemlerin yan\u0131 s\u0131ra guest y\u00f6netim portal\u0131 gibi servisleri sa\u011flar.<\/li><li>G\u00fcvenlik politikalar\u0131na uyumu kullan\u0131c\u0131 tipi, cihaz tipi ve i\u015fletim sistemi baz\u0131nda denetler.<\/li><li>Uyumlu olmayan cihazlar i\u00e7in bloklama, izole etme ve onarma gibi g\u00fcvenlik politikalar\u0131n\u0131 m\u00fcdahale gerekmeden uygulayarak tehditleri elimine etmeye \u00e7al\u0131\u015f\u0131r.<\/li><li>Kullan\u0131c\u0131lar\u0131n, cihazlar\u0131n ve uygulamalar\u0131n rol tabanl\u0131 kontrollerinin yap\u0131lmas\u0131na olanak sa\u011flar<\/li><li>Open\/RESTful API yard\u0131m\u0131yla di\u011fer g\u00fcvenlik ve a\u011f \u00e7\u00f6z\u00fcmleri ile entegre \u00e7al\u0131\u015f\u0131r.<\/li><li>EAP t\u00fcrevi kimlik do\u011frulama protokolleri kullan\u0131larak 802.1x i\u00e7in kablolu ve kablosuz a\u011flarda \u015fifreleme yap\u0131lmas\u0131na izin verir.<\/li><\/ul>\n\n\n\n<p>\u200bDe\u011fi\u015fik lokasyonlardaki verilerin korunmas\u0131, \u00e7e\u015fitli g\u00fcvenlik risklerini potansiyel olarak ta\u015f\u0131yan BYOD (BringYourOwn Device), yeni veya hen\u00fcz tan\u0131mlanmam\u0131\u015f IoT cihazlar\u0131, konuk-guest kullan\u0131c\u0131 kontrol\u00fc ve sahte kablolu ya da kablosuz u\u00e7 noktalar\u0131 gibi denetlenmesi gereken bile\u015fenler A\u011f Eri\u015fim Kontrol\u00fcn\u00fcn daha \u00e7ok yayg\u0131nla\u015fmas\u0131na yol a\u00e7maktad\u0131r. Ayr\u0131ca A\u011f Eri\u015fim Kontrol\u00fc \u00fcr\u00fcn\u00fcn\u00fcn hem kablolu hem kablosuz a\u011flar i\u00e7in eri\u015fim kontrol\u00fc sa\u011flamas\u0131 \u00f6nemli bir ayr\u0131nt\u0131d\u0131r.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" src=\"http:\/\/www.armitek.com.tr\/wp-content\/uploads\/2021\/01\/limatek-1-1024x603.jpg\" alt=\"\" class=\"wp-image-118\" width=\"256\" height=\"151\" srcset=\"http:\/\/www.armitek.com.tr\/wp-content\/uploads\/2021\/01\/limatek-1-1024x603.jpg 1024w, http:\/\/www.armitek.com.tr\/wp-content\/uploads\/2021\/01\/limatek-1-300x177.jpg 300w, http:\/\/www.armitek.com.tr\/wp-content\/uploads\/2021\/01\/limatek-1-768x452.jpg 768w, http:\/\/www.armitek.com.tr\/wp-content\/uploads\/2021\/01\/limatek-1.jpg 1108w\" sizes=\"(max-width: 256px) 100vw, 256px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-table is-style-stripes\"><table><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><td class=\"has-text-align-center\" data-align=\"center\"><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>LimRAD NAC A\u011f Eri\u015fim Kontrol Sistemi A\u011f Eri\u015fim Kontrol\u00fc network g\u00fcvenli\u011finin ilk ad\u0131m\u0131 en basiti ama en etkili y\u00f6ntemlerinden biridir. Eri\u015fim denetimi ile a\u011f \u00fczerinde izin verilmeyen hi\u00e7bir istemci ve kullan\u0131c\u0131 bulunamaz. A\u011f Eri\u015fim Kontrol\u00fc 802.1x protokol\u00fc kullan\u0131larak a\u011fa dahil olmak isteyen kullan\u0131c\u0131 bilgisayarlar\u0131n\u0131n MAC adresleri kullan\u0131larak yap\u0131l\u0131r. A\u011f Eri\u015fim Kontrol\u00fc, yetki ve izin denetimlerini [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/www.armitek.com.tr\/index.php?rest_route=\/wp\/v2\/pages\/117"}],"collection":[{"href":"http:\/\/www.armitek.com.tr\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.armitek.com.tr\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.armitek.com.tr\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.armitek.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=117"}],"version-history":[{"count":3,"href":"http:\/\/www.armitek.com.tr\/index.php?rest_route=\/wp\/v2\/pages\/117\/revisions"}],"predecessor-version":[{"id":126,"href":"http:\/\/www.armitek.com.tr\/index.php?rest_route=\/wp\/v2\/pages\/117\/revisions\/126"}],"wp:attachment":[{"href":"http:\/\/www.armitek.com.tr\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=117"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}