Enterasys-networks 9034385 Bedienungsanleitung Seite 24

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 98
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 23
Model 1: End-System Detection and Tracking
2-2 NAC Deployment Models
RADIUSAccessAcceptorAccessRejectmessagereceivedfromtheupstreamRADIUSserver,is
returnedwithoutmodificationtotheaccessedgeswitch,topermitendsystemaccesstothe
network.ForMACauthentication,aRADIUSAccessAcceptmessageisreturnedtotheaccess
edgeswitchwithoutmodification,basedonaRADIUS
AccessAcceptmessagereceivedfromthe
upstreamRADIUSserverorlocalauthorizationofMACauthenticationrequests.The
authenticatingendsystemisprovidedaccesstothenetworkbasedontheconfigurationofthe
accessedgeswitch.
Inline NAC (Layer 2)
ForinlineNACutilizingtheLayer2NACController,anendsystemcanbedetectedinmultiple
ways.Anendsystemcanbedetectedsimplybytransmittingdatatra ff icnotpreviouslyseenby
theNACcontroller.Inthiscase,thetraffic isforwardedthroughtheNACControllertothetraffic
destination,
andhasnoimpactontheconnectivityoftheendsystem.Inanothermethod,end
systemsaredetectedwiththeauthenticationofdownstreamendsystemsvia802.1X,webbased,
and/orMACauthenticationontheNACController.Theseauthenticationrequestsmayormaynot
beproxiedupstreamdependingontheNAC
configuration.
Inline NAC (Layer 3)
ForinlineNACutilizingtheLayer3NACController,anendsystemisdetectedsimplyby
transmittingdatatrafficsourcedfromanIPaddressnotpreviouslyseenbytheNACcontroller.
ThetrafficisforwardedthroughtheNACcontrollertothetrafficdestination,andhasnoimpact
ontheconnectivityof
theendsystem.
Features and Value
TherearetwokeypiecesoffunctionalityandvaluepropositionssupportedbyModel1:
End-System and User Tracking
Model1supportstheabilitytotrackendsys temsbyMACaddress,asthedevicemovesfrom
switchporttoswitchport,andmapthedeviceidentitytoitsIP addresseverytimeitconnects.
Furthermore,theassociatedusercanalsobemappedtothedeviceandIPaddress,aslong
asa
usernamebasedauthenticationmethod(802.1Xorwebbasedauthenticati on)orMAC
RegistrationisimplementedwiththeNACGateway,orifendusersareconfiguredtologinto
aMicrosoftWindowsdomainwiththeNACControllerusingKerberossnooping
functionality.
Usingthesemethods,theEnterasysNACsolutioncanidentify
who,what,when,andwhere
devicesandusersconnecttothenetwork.Thisinformationismaintainedcentrallyinthe
NetSightNACManagerdatabase,providingimportanthistoricaldatathatcanbeusedfor
auditingortroubleshootingpurposes.Inaddition,thisinformationcanbeeasilysearchedto
identifywhichportaparticularuser
iscurrentlyconnectedtoonthenetwork,orwhichdevice
iscurrentlyallocatedaparticularIPaddress.Thisbinding(IPaddress,MACaddress,
username,location),whichismaintainedovertimeforeachendsystem,isusefulfor
complianceandauditingpurposes,andforplanningthesubsequentrolloutofthenext
NAC
deploymentmodel.
IP-to-ID functionality for Security Information Management (SIM)
ThisNACdeploymentmodelenablesSIMsystemssuchastheEnterasysDragonSecurity
CommandConsole(DSCC),todisplayuserfocusedinformationaboutassetsonthenetwork.
Traditionally,SIMsystemsyielddevicefocusedinformation(suchasIPaddress)about
detectednetworkthreats,throughthecorrelation,normalization,andprioritizationofevents
Seitenansicht 23
1 2 ... 19 20 21 22 23 24 25 26 27 28 29 ... 97 98

Kommentare zu diesen Handbüchern

Keine Kommentare