Enterasys Networks 9034385 Plumbing Product User Manual


 
Enterasys NAC Design Guide 2-1
2
NAC Deployment Models
ThischapterdescribesthefourNACdeploymentmodelsandhowtheybuildoneachotherto
provideacompleteNACsolution.ThefirstmodelimplementsasubsetofthefivekeyNAC
functions(asdescribedinChapter 1),andeachsubsequentmodelprovidesadditional
functionalitywithouttheneedtoreplaceexisting
piecesoftheNACsolution.Thisallows
businesseswhoarestillintheearlystagesofNACdeployment,totakeaphasedapproachto
implementingNACwhilederivingvaluefromthesolutionateachstepalongtheway.
Model 1: End-System Detection and Tracking
ThisNACdeploymentmodelimplementsthefirstkeyNACfunction,detection.Thedetectionof
connectingendsystemsprovidesthenetworkadministratorwithvisibilityintowhatdevicesare
connectingtothenetwork,whoisusingthesedevices,andwherethedevicesareconnected.
FormanyNACdeployments,thefirstphaseconsistsof
trackingovertimetheendsystemsand
endusersconnectedtothenetwork,inordertoprofileandenumeratetheassetsontheenterprise
network.Itisimportanttonotethatinthismodel,theNACsolutiondoesnotplayapartin
authorizingaccessforconnectingendsystems,leavingthis
tothedefaultconfigurationsonthe
switch.Theendsystemsconnecttothenetworkandareallocated“businessasusual”accessto
networkresources,whiletheNACsolutionprovidesvisibilityintotheconnectionbehaviorand
detailsofthesedevices.
Implementation
Endsystemscanbedetectedandtrackedindifferentwaysdependingonwhetherinlineoroutof
bandnetworkaccesscontrolisimplemented.
Out-of-Band NAC
ForoutofbandNACutilizingtheNACGatewayappliance,detectionisimplementedasfollows.
Inthecaseofwebbasedor802.1Xauthentication,endsystemsaredetectedwiththereceiptof
RADIUSpacketsfromanaccessedgeswitchattemptingtoauthenticateanendsystem.The
For information about... Refer to page...
Model 1: End-System Detection and Tracking 2-1
Model 2: End-System Authorization 2-3
Model 3: End-System Authorization with Assessment 2-8
Model 4: End-System Authorization with Assessment and Remediation 2-12
Summary 2-16