Enterasys®Network Access ControlDesign GuideP/N 9034385
Getting Helpviii About This Guide•EnterasysNACManagerOnlineHelp.ExplainshowtouseNACManagertoconfigureyourNACappliances,andtoputinp
Enterasys NAC Design Guide 1-11OverviewThischapterprovidesanoverviewoftheEnterasysNetworkAccessControl(NAC)solution,includingadescripti
NAC Solution Overview1-2 OverviewAssessmentDetermineifthedevicecomplieswithcorporatesecurityandconfigurationrequirements,suchasoperating
NAC Solution OverviewEnterasys NAC Design Guide 1-3Model 1: End-system Detection and TrackingThisNACdeploymentmodelimplementsthedetectionpiece
NAC Solution Components1-4 OverviewNAC Solution ComponentsThissectiondiscussestherequiredandoptionalcomponentsoftheEnterasysNACsolution,b
NAC Solution ComponentsEnterasys NAC Design Guide 1-5EnterasysofferstwotypesofNACappliances:theNACGatewayapplianceimplementsout‐of‐bandne
NAC Solution Components1-6 Overviewofsupportingauthenticationand/orauthorization.TheNACControllerisalsorequiredinIPSecandSSLVPNdeploym
NAC Solution ComponentsEnterasys NAC Design Guide 1-7Appliance ComparisonThefollowingtablecompareshowthetwoNACappliancetypesimplementthefi
NAC Solution Components1-8 OverviewTable 1‐3outlinestheadvantagesanddisadvantagesofthetwoappliancetypesastheypertaintonetworksecurity,
NAC Solution ComponentsEnterasys NAC Design Guide 1-9NetSight ManagementTheNACappliancesareconfigured,monitored,andmanagedthroughmanagementa
Summary1-10 OverviewNetSight ConsoleNetSightConsoleisusedtomonitorthehealthandstatusofinfrastructuredevicesinthenetwork,includingswit
SummaryEnterasys NAC Design Guide 1-11•Model3:End‐SystemAut horization withAssessment‐Implementsdetection,authentication,assessment,andaut
Summary1-12 Overview
Enterasys NAC Design Guide 2-12NAC Deployment ModelsThischapterdescribesthefourNACdeploymentmodelsandhowtheybuildoneachothertoprovide
Model 1: End-System Detection and Tracking2-2 NAC Deployment ModelsRADIUSAccess‐AcceptorAccess‐RejectmessagereceivedfromtheupstreamRADIUSser
Model 2: End-System AuthorizationEnterasys NAC Design Guide 2-3andinformationonthenetwork.EnterasysNACcanbeleveragedtoprovideinformationt
Model 2: End-System Authorization2-4 NAC Deployment Modelsdeviceidentity,useridentity,and/orlocationinformationisusedtoauthorizetheconnect
Model 2: End-System AuthorizationEnterasys NAC Design Guide 2-5TheNACControllermayeitherdenytheend‐systemaccesstothenetworkorassignthee
Model 2: End-System Authorization2-6 NAC Deployment ModelsisonlyprovisionedbytheEnterasysNACsolutionwhenthedevicesconnecttoswitchesinth
Model 2: End-System AuthorizationEnterasys NAC Design Guide 2-7apasswordintheregistrationwebpage.Thissponsorusernameandpasswordcanbevali
iNoticeEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthisdocumentanditswebsitewitho
Model 3: End-System Authorization with Assessment2-8 NAC Deployment ModelsARADIUSserverisonlyrequiredifout‐of‐bandnetworkaccesscontrolusing
Model 3: End-System Authorization with AssessmentEnterasys NAC Design Guide 2-9serverisrunningoriftheHTTPserverisout‐of‐date)and client‐sid
Model 3: End-System Authorization with Assessment2-10 NAC Deployment ModelsFeatures and ValueInadditiontothefeaturesandvaluesfoundinModel1a
Model 3: End-System Authorization with AssessmentEnterasys NAC Design Guide 2-11•ApplicationconfigurationTheNACsolutioncandeterminewhichservice
Model 4: End-System Authorization with Assessment and Remediation2-12 NAC Deployment ModelsRequired and Optional ComponentsThissectionsummarizesthe
Model 4: End-System Authorization with Assessment and RemediationEnterasys NAC Design Guide 2-13Assistedremediationinformsenduserswhentheirend‐
Model 4: End-System Authorization with Assessment and Remediation2-14 NAC Deployment ModelsInline NACForinlineEnterasysNACdeploymentsutilizingth
Model 4: End-System Authorization with Assessment and RemediationEnterasys NAC Design Guide 2-15trafficwithspecificsourceanddestinationcharacter
Summary2-16 NAC Deployment ModelsSummaryEnterasyssupportsallofthefivekeyNACfunctions:detection,authentication,assessment,authorization,an
Enterasys NAC Design Guide 3-13Use ScenariosThischapterdescribesfourNACusescenariosthatillustratehowthetypeofNACdeploymentisdirectlyd
Scenario 1: Intelligent Wired Access Edge3-2 Use ScenarioswithinthesameQuarantineVLANbecausetheauthorizationpointisusuallyimplementedatth
Scenario 1: Intelligent Wired Access EdgeEnterasys NAC Design Guide 3-3RFC 3580 Capable EdgeInthisfiguretheNACGatewayandtheotherEnterasysNAC
Scenario 1: Intelligent Wired Access Edge3-4 Use ScenariosScenario 1 ImplementationIntheintelligentwirededgeusescenario,thefiveNACfunctions
Scenario 2: Intelligent Wireless Access EdgeEnterasys NAC Design Guide 3-5intelligentedgeonthenetwork.TheMatrixN‐seriesswitchiscapableofau
Scenario 2: Intelligent Wireless Access Edge3-6 Use ScenariosFigure 3-3 Intelligent Wireless Access Edge - Thin APs with Wireless Switch143 2Wireless
Scenario 2: Intelligent Wireless Access EdgeEnterasys NAC Design Guide 3-7Thick Wireless EdgeInathickwirelessdeployment,accesspointsforwardwir
Scenario 2: Intelligent Wireless Access Edge3-8 Use ScenariosScenario 2 ImplementationIntheintelligentwirelessaccessedgeusescenario,thefiveN
Scenario 3: Non-intelligent Access Edge (Wired and Wireless)Enterasys NAC Design Guide 3-9Itisimportanttonotethatifthewirelessedgeofthenet
Scenario 3: Non-intelligent Access Edge (Wired and Wireless)3-10 Use ScenariosFigure 3-5 Non-intelligent Access Edge (Wired and Wireless)23334513Ente
Scenario 4: VPN Remote AccessEnterasys NAC Design Guide 3-11Scenario 3 ImplementationInthenon‐intelligentaccessedgeusescenario,thefiveNACfun
iiiContentsAbout This GuideIntended Audience ...
Scenario 4: VPN Remote Access3-12 Use ScenariosFigure 3-6 VPN Remote AccessScenario 4 ImplementationIntheVPNremoteaccessusescenario,thefiveN
SummaryEnterasys NAC Design Guide 3-135.Remediation‐Whenthequarantinedenduseropensawebbrowsertoanywebsite,itstrafficisdynamicallyr
Summary3-14 Use ScenariosScenario 4:VPN remote accessSummary:VPN concentrators act as a termination point for remote access VPN tunnels into the enter
Enterasys NAC Design Guide 4-14Design PlanningThischapterdescribesthestepsyoushouldtakeasyoubeginplanningyourNACdeployment.Thefirstst
Survey the Network4-2 Design Planningaccesstoawebbrowsertosafelyremediatetheirquarantinedend‐systemwithoutimpactingIToperations.Oncead
Survey the NetworkEnterasys NAC Design Guide 4-3ThenetworkshowninFigure 4‐1below,illustratesthefollowingthreeexamplesofhowtheintelligent
Survey the Network4-4 Design PlanningFortheinlineimplementationoftheEnterasysNACsolution,theNACControllerauthenticatesandauthorizesend‐
Survey the NetworkEnterasys NAC Design Guide 4-5tolocallyauthorizeallMACauthenticationrequestsforconnectingend‐systems,therebynotrequiring
Survey the Network4-6 Design PlanningSimilarto802.1X,web‐basedauthenticationrequirestheinputofcredentialsandisnormallyusedonuser‐centri
Survey the NetworkEnterasys NAC Design Guide 4-7systematatime, thenitissuggestedthatMAClocking(alsoknownasPortSecurity)beenabledont
iv Chapter 3: Use ScenariosScenario 1: Intelligent Wired Access Edge ...
Survey the Network4-8 Design PlanningauthenticatedtothenetworkandinteractwithEnterasysNACforauthentication,assessment,authorization,andr
Survey the NetworkEnterasys NAC Design Guide 4-9Ifthenetworkinfrastructuredoesnotcontainintelligentdevicesattheedgeordistributionlayer,
Survey the Network4-10 Design Planningthiscase,thethickAPdeploymentfallsintothecategoryofnon‐intelligentedgedeviceswiththesameNACimp
Identify Inline or Out-of-band NAC DeploymentEnterasys NAC Design Guide 4-11Remote Access VPNInmanyenterpriseenvironments,aVPNconcentratorlocat
Summary4-12 Design Planningserver.Inaddition,NACcanalsobeconfiguredtolocallyauthorizeMACauthenticationrequests.3. Identifythestrategic
Enterasys NAC Design Guide 5-15Design ProceduresThischapterdescribesthedesignproceduresforEnterasysNACdeploymentonanenterprisenetwork.Th
Procedures for Out-of-Band and Inline NAC5-2 Design ProceduresPolicyManagerisnotrequiredforout‐of‐bandNACthatutilizesRFC3580‐compliantswit
Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-3Figure 5-1 Security DomainNAC ConfigurationsEachSecurityDomainhasadefault
Procedures for Out-of-Band and Inline NAC5-4 Design ProceduresFigure 5-2 NAC ConfigurationAuthenticationTheAuthenticationsettingsdefinehowRADIUS
Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-5•Howhealthresultsareprocessed.Whenanassessmentisperformedonanend‐sys
vUnregistered Policy ... 5-28In
Procedures for Out-of-Band and Inline NAC5-6 Design ProceduresThefollowingfigureshowstheNACManagerwindowusedtocreateoreditaNACConfigura
Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-7Thefollowingtableprovidesexamplesofvariousnetworkscenariosthatshould
Procedures for Out-of-Band and Inline NAC5-8 Design ProceduresArea of the network that provides access to a group of users or devices that pose a pote
Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-9Area of the network that is configured to allow access only to specific end-sys
Procedures for Out-of-Band and Inline NAC5-10 Design ProceduresThefollowingtableprovidesnetworkscenariosfromanassessmentstandpointthatshoul
Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-11Area of the network, or a group of end-systems or users, that require assessme
Procedures for Out-of-Band and Inline NAC5-12 Design Procedures3. Identify Required MAC and User OverridesMACanduseroverridesareusedtohandleen
Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-13ThefollowingfiguredisplaysthewindowsusedforMACanduseroverrideconfi
Procedures for Out-of-Band and Inline NAC5-14 Design ProceduresThefollowingtabledescribesscenarioswhereaMACoverridemaybeconfiguredforapa
Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-15A device or class of devices needs to be restricted network access (“blacklist
Procedures for Out-of-Band and Inline NAC5-16 Design ProceduresUser OverridesAuseroverrideletsyoucreateaconfigurationforaspecificenduser,
Assessment Design ProceduresEnterasys NAC Design Guide 5-17Managerwillnotmatchthisend‐systemandtheend‐systemisassignedtheSecurityDomain’s
Assessment Design Procedures5-18 Design Procedures2. Determine Assessment Server LocationWhendeterminingthelocationoftheassessmentserversonth
Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-19configurationifthesecurityvulnerabilityisconsideredariskfortheorganization.
Out-of-Band NAC Design Procedures5-20 Design Procedures2. Determine the Number of NAC GatewaysThenumberofNACGatewaystobedeployedonthenetwork
Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-21Figure 5-5 NAC Gateway RedundancyItisimportantthatthesecondaryNACGatewaydoes
Out-of-Band NAC Design Procedures5-22 Design ProceduresprimaryNACGateway,thetransitiontothesecondaryNACGatewaywillnotexceedmaximumcapaci
Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-23Itisimportanttonotethatonly theNACGatewaysthatareconfiguredwithremediati
Out-of-Band NAC Design Procedures5-24 Design Procedures6. VLAN ConfigurationThisstepisforNACdeploymentsthatuseRFC‐3580‐compliantswitchesint
Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-25previouslyspecifiedintheNACconfigurationmustbedefinedinNetSightPolicyManag
Enterasys NAC Design Guide viiAbout This GuideTheNACDesignGuidedescribesthetechnicalconsiderationsfortheplanninganddesignoftheEnterasys
Out-of-Band NAC Design Procedures5-26 Design ProceduresFigure 5-6 Policy Role Configuration in NetSight Policy ManagerAssessment PolicyTheAssessment
Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-27Figure 5-7 Service for the Assessing RoleNotethatitisnotmandatorytoassignthe
Inline NAC Design Procedures5-28 Design ProceduresFigure 5-8 Service for the Quarantine RoleFurthermore,theQuarantinePolicyandothernetworkinfr
Inline NAC Design ProceduresEnterasys NAC Design Guide 5-29However,theclosertheNACControllerisplacedtotheedgeofthenetwork,themoreNACC
Inline NAC Design Procedures5-30 Design Procedures2. Determine the Number of NAC ControllersThenumberofNACControllerstobedeployedonthenetwor
Inline NAC Design ProceduresEnterasys NAC Design Guide 5-31Figure 5-9 Layer 2 NAC Controller RedundancyForaLayer3NACController,redundancyisac
Inline NAC Design Procedures5-32 Design Procedures3. Identify Backend RADIUS Server InteractionLayer2NACControllersdetectdownstreamend‐systemsv
Additional ConsiderationsEnterasys NAC Design Guide 5-33assessmentserverstoreachtheend‐systemwhileitisbeingassessed,regardlessofwhethert
Additional Considerations5-34 Design Procedures
Kommentare zu diesen Handbüchern