Enterasys-networks 9034385 Bedienungsanleitung Seite 83

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 98
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 82
Out-of-Band NAC Design Procedures
Enterasys NAC Design Guide 5-19
configurationifthesecurityvulnerabilityisconsideredariskfortheorganization.Formore
informationonNessus,refertohttp://nessus.org/.
Out-of-Band NAC Design Procedures
ThefollowingsectioncontinuestheEnterasysNACdesignprocedurewithstepsspecifically
relatingtotheimplementationofoutofbandNACwiththeNACGateway.
1. Identify Network Authentication Configuration
SinceNACGatewaysutilizeauthenticationforthedetectionofconnectingendsystems,itis
necessarytoidentifywhichauthenticationmethodsaretobeconfiguredintheintelligentedgeof
thenetwork.Formoreinformationonevaluatingauthenticationonthenetwork,see“Surveythe
Network”(page 42).
Thefollowingconsiderationsshouldbe
takenintoaccountwhendeployingauthenticationonthe
network:
•Thecapabilitiesofendsystemsconnectingtothenetwork.
Humancentricdevicesmaysupportuserbasedauthenticationmethodssuchas802.1X or
webbasedauthenticationonlyifan802.1Xsupplicantorawebbrowserissupportedonthe
endsystem.Machinecentric
devicesmostlikelyonlysupportdevicebasedauthentication
methodslikeMACauthentication.
•Thetypesofusersconnectingtothenetwork.
Itisnecessarytounderstandhowauthenticationaffectsthedifferenttypeofusersconnecting
tothenetworkandwhatimplicationsthishasontheNACsolution.Forexample,while
trustedusers
authenticateusingasetofvalidcredentialsheldinadirectoryonthenetwork,
untrustedorguestusersmayfailauthenticationuponconnection.
•Thecomplexityinvolvedindeployingauthenticationonthenetwork,ifitisnotyetdeployed.
Rollingout802.1Xauthenticationonthenetworkrequiresextensiveplanningandmandates
configuration
andpossibleupgradeofinfrastructuredevicesandendsystems,andthe
disseminationofcredentialstoconnectingusersanddevices.Sincethisisasignificant
undertaking,itmaybedesirabletoutilizeMACbasedauthenticationfortheinitialrolloutof
NACandmigrateoverto802.1Xoveraperiodoftime.
Thisway,mostbenefitsofNACcanbe
obtainedintheshorttermwhiletheinfrastructureisreadiedforafull802.1Xauthentication
rollout.
•Theauthenti cationmethodsupportedbytheintelligentedgeofthenetwork.
Edgeinfrastructuredevicesmayneedtosupportmultipleauthentication methods
concurrentlytoaccountfordifferentdevices
connectingtothenetwork.Furthermore,the
authenticationandauthorizationofmultipledevicesonasingleportmayalsoneedtobe
supported.
Seitenansicht 82
1 2 ... 78 79 80 81 82 83 84 85 86 87 88 ... 97 98

Kommentare zu diesen Handbüchern

Keine Kommentare