Enterasys-networks 9034385 Bedienungsanleitung Seite 60

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 98
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 59
Survey the Network
4-8 Design Planning
authenticatedtothenetworkandinteractwithEnterasysNACforauthentication,assessment,
authorization,andremediation.Notehowever,thatthisconfigurationmaynotbepossibleif
trustedusersarealsobeingMACauthenticatedtothenetworkinthesameSecurityDomain.
Inthiscase,MACoruseroverrideswouldneedtobe
configuredforthetrustedusers,andthe
defaultNACconfigurationoftheSecurityDomainwouldspecifytheNACimplementation
forguestusers.
•Ifguestaccess isimplementedwithwebbasedauthenticationusingtheguestnetworking
featureonEnterasyspolicycapableswitches(supplyingdefaultcredentialsintheweblogin
pageforguest
users),theguestnetworkingfeaturemustbeconfiguredtosendthedefault
credentialstoabackendRADIUS serverandnotlocallyauthenticatethem.Thisisbecausein
theoutofbandNACconfiguration,theNACGatewaymustreceivetheauthentication
attemptviaRADIUSinordertodetecttheconnectingend
systems.ARADIUSserverwith the
guestnetworkingcredentialsmustbedeployedonthenetworksotheNACGatewaycan
proxytheRADIUSrequeststotheupstreamRADIUSserver.IfaRADIUSFilterIDorVLAN
Tunnelattributeisnotconfiguredfortheguestnetworkingcredentialsontheupstream
RADIUSserver,
EnterasysNACcanbeconfiguredtoincludeaFilterIDorVLANTunnel
attributeintheRADIUSAccessAcceptpacketreturnedtotheswitchbyimplementingauser
overridefortheguestnetworkingusername.
3. Identify the Strategic Point for End-System Authorization
Inthisstep,youwillidentifythestrategicpointinthenetworkwhereendsystemauthorization
shouldbeimplemented.
Themostsecureplaceforimplementingauthorizationisdirectlyatthepointofconnectionatthe
edgeofthenetwork,assupportedbyEnterasyspolicycapableswitches.Inthisconfiguration,the
implementation
ofoutofbandNACusingtheNACGatewayapplianceleveragespolicyon
Enterasysswitchestosecurelyauthorizeconnectingendsystems.
RFC3580capableswitchescanbeusedforauthenticationandauthorizationbyassigningend
systemstoparticularVLANsbasedontheauthenticationandassessmentresults.However,thisis
not
assecureasusingEnterasyspolicycapableswitches,forthetwofollowingreasons:
•VLANsauthorizeendsystemsbyplacingthemintothesamecontainer,withthetraffic
enforcementpointimplementedattheingress/egresspointtotheVLANontheVLANʹs
routedinterface.Be causeauthorizationisnotimplementedbetweenendsystems
withinthe
sameVLAN,anendsystem inaVLANisopentolaunchattacksorbeattackedbyother
deviceswithinthesameVLAN.Forexample,ifendsystemAwithvirusXandendsystemB
withvirusYarequarantinedintothesameVLAN,thenendsystemA
andBmaybecome
infectedwithvirusXandY.Enterasyspolicyuniquelyauthorizesconnectingendsystems
independentoftheirVLANassignmentbypermitting,denying,andprioritizingtrafficon
ingresstothenetworkattheportlevel.
•BecauseRFC3580capableswitchesimplementthetrafficenforcementpointforaVLANat
theVLAN’sroutedinterface,malicioustrafficisallowedontothenetworkandmayconsume
bandwidth,memory,andCPUcyclesoninfrastructuredevicesbeforebeingdiscarded
possiblyseveralhopsdeepwithinthenetwork.Thisisespeciallydetrimentaltotheoperation
ofthenetworkifasingleinterswitchlinkconnectingthe
accesslayertodistributionlayeris
usedtotransmittrafficfromboththequarantineVLANandtheproductionVLAN(suchasan
802.1QVLANtrunkedlink).Trafficfromquarantinedendsystems(forexample,worms
scanningforvulnerablehosts)canconsumetheentirebandwidthavailableontheinterswitch
linkandaffect
networkconnectivityforendsystemsontheproductionVLAN.Incontrast,
sincethetrafficenforcementpointforEnterasyspolicyisattheportofconnection,malicious
trafficneveringressesthenetworktocauseanydisruptiontonetworkconnectivity.
Seitenansicht 59
1 2 ... 55 56 57 58 59 60 61 62 63 64 65 ... 97 98

Kommentare zu diesen Handbüchern

Keine Kommentare