Enterasys Networks 9034385 Plumbing Product User Manual


 
Model 2: End-System Authorization
2-4 NAC Deployment Models
deviceidentity,useridentity,and/orlocationinformationisusedtoauthorizetheconnectingend
systemwithacertainlevelofnetworkaccess.Itisimportanttonotethatinthismodel,network
accessisnotbeingcontrolledbasedonendsystemassessmentresults.Assessmentwillbe
introducedinthenextNAC
deploymentmodel.
Implementation
InModel2,endsystemscanbedetected,authenticated,andauthorizedindifferentways
dependingonwhetherinlineoroutofbandnetworkaccesscontrolisimplemented.
Out-of-Band NAC
ForoutofbandNACutilizingtheNACGateway,NACfunctionsareimplementedinthe
followingway:
Detection‐End systemsaredetectedviathereceiptofRADIUSpacketsfromanaccessedge
switchattempting toauthenticateanendsystem.
Authentication‐Iftheendsystemis802.1Xorwebauthenticatingtothenetwork,
theNAC
GatewayproxiestheRADIUSauthenticationrequesttoabackend authentication(RADIUS)
servertovalidatetheidentityoftheuser/deviceconnectingtothenetwork.Forendsystemsthat
areMACauthenticatingtothenetwork,theNACGatewaycanbeconfiguredtoeitherproxythe
MACauthenticationrequeststoa
RADIUSserverorlocallyauthorizeMACauthentication
requestsattheNACGateway.IfonlyMACauthenticationisdeployedonthenetworkandthe
NACGatewayisconfiguredtolocallyauthorizeMA C a uthenti cationrequests,thenabackend
RADIUSserverisnotrequiredfortheEnterasysNACsolution.
Authorization‐TheNACGatewayallocates
theappropriatenetworkresourcestotheendsystem
basedondeviceidentity,useridentity,andlocation.ForEnterasyspolicyenablededgeswitches,
theNACGatewayformatsinformationintheRADIUSauthenticationmessagesthatdirectsthe
edgeswitchtodynamicallyassignaparticularpolicytotheconnectingendsystem.ForRFC3580
capableedgeswitches,theNACGatewayformatsinformationintheRADIUSauthentication
messages(intheformofRFC3580VLANTunnelattributes)thatdirectstheedgeswitch to
dynamicallyassignaparticularVLANtotheconnectingendsystem.TheNACGatewaymay
denytheendsystemaccesstothenetwork
bysendingaRADIUSAccessRejectmessagetothe
edgeswitchorassigntheendsystemasetofnetworkresourcesbyspecifyingaparticularpolicy
orVLANtoassigntotheauthenticatedendsystemontheedgeswitch.
Inline NAC
ForinlineNACutilizingtheLayer2orLayer3NACController,NACfunctionsareimplemented
inthefollowingway:
Detection‐End systemsaredetectedviathereceiptofRADIUSpacketsfromanaccessedge
switchattempting toauthenticateanendsystem.
Authentication‐Oneoftwoauthenticationconfigurationscanbeimplementedon
theNAC
Controller.Authenticationcanbedisabledaltogether,trustingthatthedownstreaminfrastructure
devicesauthenticatedtheendsystemandpermittednetworkaccess.Alternately,MAC
registrationcanbeimplementedfornewdevicesconnectingtothenetwork,whereausername
andpasswordand/orasponsorusernameandpasswordmustbevalidatedagainst
abackend
LDAPcompliantdatabasebeforenetworkaccessispermitted.
Authorization‐TheNACControllerallocatestheappropriatenetworkresourcestotheend
systembyassigningapolicylocallyonthecontrollertothetrafficsourcedfromtheendsystem.