Enterasys-networks 9034385 Bedienungsanleitung Seite 49

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 98
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 48
Scenario 4: VPN Remote Access
Enterasys NAC Design Guide 3-11
Scenario 3 Implementation
Inthenonintelligentaccessedgeusescenario,thefiveNACfunctionsareimplementedinthe
followingmanner:
1.Detection‐Theuserʹsendsystemconnectstothenetworkandtransmitsdatatrafficontothe
networkthattraversestheNACController.ThistrafficissourcedfromaMACaddressorIP
addressnotpreviouslyseenbythecontroller.
2.Authentication‐OneoftwoconfigurationsmaybeimplementedontheNACControllerfor
enduserauthentication.Authenticationcanbedisabledaltogether,trustingthatthedownstream
infrastructuredevicesauthenticated theendsystemtothenetwork(802.1Xauthenticationtothe
wirelessLAN,webbasedauthentication
tothewiredLAN).Alternatively,MACregistrationcan
beimplemented,whereanenduserusernameandpasswordand/orsponsorusernameand
passwordmustbevalidatedagainstabackendLDAPcompliantdatabasebeforenetworkaccessis
permitted.
3.Assessment‐Aftertheidentityoftheendsystemorenduserisvalidatedby
authentication,the
NACControllerrequestsanassessmentoftheendsystemaccordingtopredefinedsecuritypolicy
parameters.Theassessmentcanbeagentbasedoragentless,andisexecutedlocallybytheNAC
Controllerʹsassessmentfunctionalityand/orremotelybyapoolofassessmentservers.
4.Authorization‐Onceauthenticationandassessment
arecomplete,theNACController
allocatestheappropriatenetworkresourcestotheendsystembasedonauthenticationand/or
assessmentresults.ThisisimplementedlocallyontheNACControllerbyassigningapolicyto
trafficsourcedfromthisendsystem.Ifauthenticationfailsand/ortheassessmentresultsindicate
anoncompliantendsystem,
theNACControllercaneitherdenytheendsystemaccesstothe
networkorquarantinetheendsystembyspecifyingaparticularpolicyontheNACController.
5.Remediation‐Whenthequarantinedenduseropensawebbrowsertoanywebsite,itstrafficis
dynamicallyredirectedtoaRemediationweb
pagethatdescribesthecomplianceviolationsand
providesremediationsstepsfortheusertoexecuteinordertoachievecompliance.Aftertaking
theappropriateremediationsteps,theenduserclicksonabuttononthewebpagetoreattempt
networkaccess,forcingthereassessmentoftheendsystem.At
thispoint,theEnterasysNAC
solutiontransitionstheendsystemthroughtheentireNACcycleofdetection,authentication,
assessment,andauthorization,reassessingthesecuritypostureoftheendsystemtodetermineif
theremediationtechniquesweresuccessfullyfollowed.Iftheendsystemisnowcompliant,the
NACControllerauthorizesthe
endsystemwiththeappropriateaccesspolicy.Iftheendsystemis
notcompliant,theendsystemisrestrictedaccesstothenetworkbyassigningapolicytotheend
systemontheNACController,andtheprocessstartsagain.
Scenario 4: VPN Remote Access
IntheVPNremoteaccessusescenario,VPNconcentratorsactasaterminationpointforremote
accessVPNtunnelsintotheenterprisenetwork.
Forthisusescenario,theNACControllerapplianceisdeployedtoauthorizeconnectingend
systemsonthenetworkandimplementnetworkaccesscontrol.
Thefollowingfigureillustrateshowthe
NACControllerandtheotherEnterasysNAC
componentsworktogetherinaVPNremoteaccessdeploymenttoprovideacomprehensiveNAC
solution.
Seitenansicht 48
1 2 ... 44 45 46 47 48 49 50 51 52 53 54 ... 97 98

Kommentare zu diesen Handbüchern

Keine Kommentare