Enterasys Networks 9034385 Plumbing Product User Manual


 
NAC Solution Overview
1-2 Overview
Assessment
Determineifthedevicecomplieswithcorporatesecurityandconfigurationrequirements,suchas
operatingsystempatchrevisionlevelsandantivirussignaturedefinitions.Othersecurity
compliancerequirementsmightincludethephysicallocationofthedeviceandthetimeofdaythe
connectionattemptismade.
Authorization
Determinetheappropriatenetworkaccessfortheconnectingdevicebasedontheauthentication
and/orassessmentresults,andenforcethisauthorizationleveltotheendsystem.The
authorizationlevelcanbedeterminedbasedonthedeviceʹslocation,MACaddress,andsecurity
posture(asdeterminedbytheassessmentresults),inadditionto
theidentityoftheuser/device
validatedthroughauthentication.
Theendsystemcanbeauthorizedfornetworkaccessusingdifferenttechniques,suchas
reconfiguringaccessedgeswitchesorleveragingaspecializedNACappliancedeployedinthe
transmissionpathofendsystemdatatraffic.InlineandoutofbandNACimplementationsuse
differenttechniquesforauthorizingendsystemsonthenetwork,eachwithuniqueadvantages
anddisadvantagesasdiscussedlaterinthischapter.
Remediation
EnableenduserstosafelyremediatetheirnoncompliantendsystemswithoutimpactingIT
operations.Withremediation,userscanbenotifiedwhentheirsystemisquarantinedfornetwork
securitypolicynoncompliance,andtheycanbedirectedtoperformselfserviceremediation
techniquesspecifictothe detectedcomplianceviolation.Notificationmethods
includeweb
redirectionviaacaptiveportal,emailnotification,popupmessages,andmessengerservice
integration,amongothers.
Theremediationprocessincludesupdatingthedevicetomeetcorporatesecurityrequirements
(forexample,updatingoperatingsystempatchesandantivirussignatures)and reinitiatingthe
networkaccessprocess.Networkresourcescanbeautomaticallyreallocated
toendsystemsthat
havesuccessfullyperformedtheremediationsteps,withouttheinterventionofIToperations.
Deployment Models
ThefivekeyNACfunctionsdescribedabovedonotneedtobeimplementedconcurrentlyina
NACdeployment.Forexample,tosupportMACregistrationfor guests andotherusersonthe
network,thedetection,authentication,andauthorizationfunctionalitiescanbeimplemented
withouttheassessmentfunctionality.ThisallowsanITdepartmentto
gainvisibilityintowhois
usingwhichdevicesonthenetworkwhileallowingonlyvaliduserstoenterthenetwork.
Asanotherexample,theassessmentfunctionalitycanbeaddedtothedetection,authentication,
andauthorizationofendsystemswithouttheremediationfunctionality,allowingfortheauditing,
butnotquarantining,ofconnecting
endsystems.Thisprovidesvisibilityintothesecurityposture
andconfigurationofconnectingendsystemswithoutimpactingdevicenetworkconnectivity,and
canbeusedforauditingandsoftwareupdatepurposesbytheITdepartment.
ThefourNACdeploymentmodelsdescribedbelowbuildoneachotherbyimplementingsubsets
ofthe
fivekeyNACfunctions.EachmodelprovidesparticularaspectsofNACfunctionality,
supportingtherequirementsofdiverseenterpriseenvironments.Witheachsubsequentmodel,
theadditionalNACfunctionalitycanbeenabledwithouttheneedtoreplacepiecesofthe
EnterasysNACsolution.