Enterasys-networks 9034385 Bedienungsanleitung Seite 64

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 98
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 63
Summary
4-12 Design Planning
server.Inaddition,NACcanalsobeconfiguredtolocallyauthorizeMACauthentication
requests.
3. Identifythestrategicpointinthenetworkwhereendsystemauthorizationshouldbe
implemented.
Themostsecureplaceforimplementingauthorizationisdirectlyatthepointofconnectionat
theedgeofthenetwork,assupportedby
Enterasyspolicycapableswitches.Inthis
configuration,theimplementationofoutofbandNACusingtheNACGatewayappliance
leveragespolicyonEnterasysswitchestosecurelyauthorizeconnectingendsystems.
Ifthenetworkinfrastructuredoesnotcontainintelligentdevicesattheedgeordistribution
layer,theninlineNACusingtheNAC
Controllerastheauthorizationpointforconnecting
endsystemsmustbeimplemented.
4. Identifythenetworkconnectiontypesbeingused.Thepreviousstepshavebeenconcerned
withimplementingNACfortheinternalLAN.Inthisstep,thefollowingconnectiontypesare
discussedalongwiththeirimpactontheEnterasysNACsolution.
–Wired
LAN
WirelessLAN
–RemoteAccessWAN
–SitetoSiteVPN
–RemoteAccessVPN
BasedontheNACdeploymentmodelyouselect,andtheresultsofyournetworkinfrastructure
evaluation,youwillbeabletoidentifywhetheroutofbandNACorinlineNACwillbedeployed
inthedifferentareasofyournetwork.
Seitenansicht 63
1 2 ... 59 60 61 62 63 64 65 66 67 68 69 ... 97 98

Kommentare zu diesen Handbüchern

Keine Kommentare