Enterasys-networks 9034385 Bedienungsanleitung Seite 33

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 98
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 32
Model 3: End-System Authorization with Assessment
Enterasys NAC Design Guide 2-11
•Applicationconfiguration
TheNACsolutioncandeterminewhichservicesandapplicationsareinstalledandenabledon
theendsystem.Certainapplicationsshouldberemovedfromthedevicepriortoestablishing
connectivitybecausetheymayhaveanegativeimpactontheoperationoftheendsystem,
distracttheenduserfrombusiness
functions,orbeusedtolaunchattacksonthenetwork.
Furthermore,particularservicesmaybeoutdatedandvulnerabletoattack.Theseservices
shouldeitherbeupdatedordisabledtominimizetherisktoconnectingendsystemsonthe
network.TheNACsolutionfacilitatesthisreconfigurationofapplicationsonanend system
priortonetworkconnection,toensuremaximumsecurityandproductivitywhenthede vice
connects.
Diverse Security Posture Compliance Verification
InorderforaNACsolutiontobeeffective,inclusionofallendsystemsinthenetwork
environmentmustbeaddressedwhendetecting,authenticating,assessing,andauthorizing
devices.TheEnterasysNACsolutionsupportsadiverseendsystemenvironment,and
providesintegratedsecurityandmanagementregardlessofwhattypeofdevicesare
connectedtothebusinessnetwork.
Enterasysleveragestwoassessmentmodels:agentbasedandagentless.Anagentbased
assessmentandanagentlessassessmentarebothcriticaltoensuringthatanyendsystemof
anytypecanbeincludedintheNACprocess.Thereareseveralreasonswhybothassessment
modelsarecriticaltoacompleteNACsolution.Securityagentsloadedontomanagedend
systemsofferextensiveassessmentcapabilities.Ifanagentisrequired,anewendsystem
connectingtothenetworkthathasnotdownloadedtheagentcanbequarantinedand
redirectedtoawebpage.Thewebpageprovides
informationonhowtheagentcanbe
downloadedandinstalledontheendsystemtobeginitsassessment.
However,therearetypesofendsystemsinatypicalnetworkthatmaynotbeabletoloada
softwareagent,suchasIPphones,securi tycameras,orprinters.Ifasecurity
agentisnot
availableforadevice(ortheoperatingsystemsrunningthedevice),anagentlessapproachis
theonlywaytoassesstheendsystem.Inaddition,considerendsystemsthatcouldnormally
holdanagent,butarenotunderthecontroloftheITorganization.Inthecase
ofguest
networkingthatprovidessupportforcontractors,vendors,andthepublic,thedesiremaybe
tosupportminimalorspecificnetworkservices,butstillensurethesafetyandsecurityofthe
networkandthepeopleusingit.Itisnotenoughtosimplyuseanetworkusagepolicyto
restricttheservicesaguestuserisallowedtoaccess.Becausetheguestisleveragingthesame
networkinfrastructureasthecriticalbusinessusers,itisimportantthatproactivesecurity
measuresareappliedtotheguestjustastheyaretoamanageduser.Thisisanothercase
whereanagent
lessapproachtoendsystemassessmentcanbecriticaltoensuringa
comprehensiveNACstrategy.
Boththeagentbasedandtheagentlessassessmentmodelscanbedeployedandintegrated
togetherintheEnterasysNACsolution.
Seitenansicht 32
1 2 ... 28 29 30 31 32 33 34 35 36 37 38 ... 97 98

Kommentare zu diesen Handbüchern

Keine Kommentare