Enterasys-networks 9034385 Bedienungsanleitung Seite 23

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 98
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 22
Enterasys NAC Design Guide 2-1
2
NAC Deployment Models
ThischapterdescribesthefourNACdeploymentmodelsandhowtheybuildoneachotherto
provideacompleteNACsolution.ThefirstmodelimplementsasubsetofthefivekeyNAC
functions(asdescribedinChapter 1),andeachsubsequentmodelprovidesadditional
functionalitywithouttheneedtoreplaceexisting
piecesoftheNACsolution.Thisallows
businesseswhoarestillintheearlystagesofNACdeployment,totakeaphasedapproachto
implementingNACwhilederivingvaluefromthesolutionateachstepalongtheway.
Model 1: End-System Detection and Tracking
ThisNACdeploymentmodelimplementsthefirstkeyNACfunction,detection.Thedetectionof
connectingendsystemsprovidesthenetworkadministratorwithvisibilityintowhatdevicesare
connectingtothenetwork,whoisusingthesedevices,andwherethedevicesareconnected.
FormanyNACdeployments,thefirstphaseconsistsof
trackingovertimetheendsystemsand
endusersconnectedtothenetwork,inordertoprofileandenumeratetheassetsontheenterprise
network.Itisimportanttonotethatinthismodel,theNACsolutiondoesnotplayapartin
authorizingaccessforconnectingendsystems,leavingthis
tothedefaultconfigurationsonthe
switch.Theendsystemsconnecttothenetworkandareallocated“businessasusual”accessto
networkresources,whiletheNACsolutionprovidesvisibilityintotheconnectionbehaviorand
detailsofthesedevices.
Implementation
Endsystemscanbedetectedandtrackedindifferentwaysdependingonwhetherinlineoroutof
bandnetworkaccesscontrolisimplemented.
Out-of-Band NAC
ForoutofbandNACutilizingtheNACGatewayappliance,detectionisimplementedasfollows.
Inthecaseofwebbasedor802.1Xauthentication,endsystemsaredetectedwiththereceiptof
RADIUSpacketsfromanaccessedgeswitchattemptingtoauthenticateanendsystem.The
For information about... Refer to page...
Model 1: End-System Detection and Tracking 2-1
Model 2: End-System Authorization 2-3
Model 3: End-System Authorization with Assessment 2-8
Model 4: End-System Authorization with Assessment and Remediation 2-12
Summary 2-16
Seitenansicht 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 97 98

Kommentare zu diesen Handbüchern

Keine Kommentare