Enterasys Networks 9034385 Plumbing Product User Manual


 
Model 1: End-System Detection and Tracking
2-2 NAC Deployment Models
RADIUSAccessAcceptorAccessRejectmessagereceivedfromtheupstreamRADIUSserver,is
returnedwithoutmodificationtotheaccessedgeswitch,topermitendsystemaccesstothe
network.ForMACauthentication,aRADIUSAccessAcceptmessageisreturnedtotheaccess
edgeswitchwithoutmodification,basedonaRADIUS
AccessAcceptmessagereceivedfromthe
upstreamRADIUSserverorlocalauthorizationofMACauthenticationrequests.The
authenticatingendsystemisprovidedaccesstothenetworkbasedontheconfigurationofthe
accessedgeswitch.
Inline NAC (Layer 2)
ForinlineNACutilizingtheLayer2NACController,anendsystemcanbedetectedinmultiple
ways.Anendsystemcanbedetectedsimplybytransmittingdatatra ff icnotpreviouslyseenby
theNACcontroller.Inthiscase,thetrafficisforwardedthroughtheNACControllertothetraffic
destination,
andhasnoimpactontheconnectivityoftheendsystem.Inanothermethod,end
systemsaredetectedwiththeauthenticationofdownstreamendsystemsvia802.1X,webbased,
and/orMACauthenticationontheNACController.Theseauthenticationrequestsmayormaynot
beproxiedupstreamdependingontheNAC
configuration.
Inline NAC (Layer 3)
ForinlineNACutilizingtheLayer3NACController,anendsystemisdetectedsimplyby
transmittingdatatrafficsourcedfromanIPaddressnotpreviouslyseenbytheNACcontroller.
ThetrafficisforwardedthroughtheNACcontrollertothetrafficdestination,andhasnoimpact
ontheconnectivityof
theendsystem.
Features and Value
TherearetwokeypiecesoffunctionalityandvaluepropositionssupportedbyModel1:
End-System and User Tracking
Model1supportstheabilitytotrackendsys temsbyMACaddress,asthedevicemovesfrom
switchporttoswitchport,andmapthedeviceidentitytoitsIPaddresseverytimeitconnects.
Furthermore,theassociatedusercanalsobemappedtothedeviceandIPaddress,aslong
asa
usernamebasedauthenticationmethod(802.1Xorwebbasedauthenticati on)orMAC
RegistrationisimplementedwiththeNACGateway,orifendusersareconfiguredtologinto
aMicrosoftWindowsdomainwiththeNACControllerusingKerberossnooping
functionality.
Usingthesemethods,theEnterasysNACsolutioncanidentify
who,what,when,andwhere
devicesandusersconnecttothenetwork.Thisinformationismaintainedcentrallyinthe
NetSightNACManagerdatabase,providingimportanthistoricaldatathatcanbeusedfor
auditingortroubleshootingpurposes.Inaddition,thisinformationcanbeeasilysearchedto
identifywhichportaparticularuser
iscurrentlyconnectedtoonthenetwork,orwhichdevice
iscurrentlyallocatedaparticularIPaddress.Thisbinding(IPaddress,MACaddress,
username,location),whichismaintainedovertimeforeachendsystem,isusefulfor
complianceandauditingpurposes,andforplanningthesubsequentrolloutofthenext
NAC
deploymentmodel.
IP-to-ID functionality for Security Information Management (SIM)
ThisNACdeploymentmodelenablesSIMsystemssuchastheEnterasysDragonSecurity
CommandConsole(DSCC),todisplayuserfocusedinformationaboutassetsonthenetwork.
Traditionally,SIMsystemsyielddevicefocusedinformation(suchasIPaddress)about
detectednetworkthreats,throughthecorrelation,normalization,andprioritizationofevents