Enterasys Networks 9034385 Plumbing Product User Manual


 
Model 2: End-System Authorization
Enterasys NAC Design Guide 2-5
TheNACControllermayeitherdenytheendsystemaccesstothenetworkorassigntheend
systemtoaparticularsetofnetworkresourcesbyspecifyingaparticularpolicy.
Features and Value
InadditiontothefeaturesandvaluesfoundinModel1,thefollowingarekeypiecesof
functionalityandvaluepropositionssupportedbyModel2,EndSystemAuthorization:
Location-Based Authorization
Inadditiontoprovidingvisibilityintowho,what,when,andwheredevicesandusersare
connectingtothenetwork,thisdeploymentmodelallowsIToperationstocontrolaccessto
thenetworkwithdifferentlevelsofauthorizationbasedontheseparameters.Forlocation
basedauthorization,theEnterasysNACsolutioncanassigna
levelofaccesstoaconnecting
enduserordevicebasedonwhichareaofthenetworktheendsystemisconnected,through
theconfigurationofSecurityDomains.Forexample,whenanengineerconnectstothe
networkfromacontrolledareaofthenetworksuchasthelab,ora
facultymemberconnectsto
thenetworkfromaphysicallysecured facultyoffice,theengineerandfacultymemberare
appropriatelyauthorizedtoaccesssensitiveinformationresidingoninternalservers.
However,ifthesameusersconnecttothenetworkfromanunsecuredareaofthenetwork
suchastheopenwirelessLANavailable
intheenterpriseʹslobbyorcampus,orinastudent
dormitory,thentheseendsystemscanbeauthorizedwithadifferentlevelofnetworkaccess,
possiblyrestrictingcommunicationtotheinternalserversandotherresourcesonthenetwork.
Furthermore,theNACsolutioncanalsolockadevicetoa
specificswitchorswitchport,using
the“LockMAC”feature.Ifthedeviceismovedtoanyotherswitchportonthenetwork,it
willnotbeabletoconnect.Forexample,aprinteroraservercontainingsensitivedatamaybe
connectedtothenetworkataspecificlocation,such
asbehindafirewalloronaparticular
VLANforsecurityreasons.Physicallymovingtheconnectionofthesedevicestoanopenarea
ofthenetworkincreasestheriskofthesedevicesbeingattackedandcompromisedbecause
theywouldnolongerbeprotectedbythesecuritymechanismsthatwereput
inplaceonthe
network.The“LockMAC”featurecanbeusedtolimitthemobilityofspecificdevicesand
avoidmaliciousorunintentionalmisconfigurationsonthenetwork,therebyreducingrisk.
Device-Based Authorization
WiththisNACdeploymentmodel,endsystemsareauthorizedwithaccesstoaspecificsetof
networkresourcesbasedontheendsystemʹsMACaddress.Forinitialimplementation,the
EnterasysNACsolutionisconfiguredinamodewhereallMACaddressesofconnectingend
systemsarepermittedontothenetwork
anddynamicallylearned.TheEnterasysNAC
solutionisthenconfiguredtoallowonlyknownMACaddressesontothenetwork,assigning
eachendsystemaparticularauthorizationlevel.AnynewMACaddressconnectingtothe
networkisassignedadifferentauthorizationlevel,suchasdeniedaccess,restrictedaccess,or
allowedaccess
iftheuserisabletoproperlyregistertheirdevicetothenetwork.
TheEnterasysNACsolutionisabletoauthorizespecificdevicesorclassesofdevices(ba sed
onMACaddressOUIprefix)withaccesstoaspecificsetofnetworkresourcesthroughthe
configurationofMACoverrides.Forexample,an
endsystemthatisknowntobeinfected
withaworm,apubliclyaccessiblemachine,oramachinebelongingtoguestusermaybe
authorizedwitharestrictivesetofnetworkresourcesorcompletelydeniednetworkaccess,
regardlessofwhereandwhenthisdeviceconnects.Incontrast,anendsystembelonging
to
theIToperationsgroupmaybepermittedunrestrictedaccesstonetworkresourcesfor
infrastructuretroubleshootingandmaintenancepurposes,regardlessofwhereandwhenthe
deviceconnectstothenetwork.Ifyouaddlocationbasedauthorization(asdiscussedabove)
tothisexample,thenunrestrictedaccessforendsystemsbelongingto
theIToperationsgroup