Enterasys Networks 9034385 Plumbing Product User Manual


 
Model 2: End-System Authorization
2-6 NAC Deployment Models
isonlyprovisionedbytheEnterasysNACsolutionwhenthedevicesconnecttoswitchesin
theNetworkOperationsCenter(NOC).Thislevelofgranularityinprovisioningaccessto
connectingdevicesprotectsagainstpossibleMACspoofingattacks.
Inadditiontoauthorizingaparticulardevicewithasetofnetworkresources,groupsof
devicessuchasIPphones,printers,andworkstationscanbeprovisionedaspecificsetof
networkresourcesusingMACaddressOUIprefixorcustomMACaddressmask.For
example,IPphonesmaybeidentifiedbythePolycomMACaddressOUIprefix
00:04:F2:XX:XX:XXandassignedtheVoiceVLANandahighQoS.
Insummary,devicebasedauthorizationsupportstheprovisioningofnetworkresourcestoa
connectingendsystembasedonthedeviceʹsidentityaswellaslocation.Thisprovidesthe
abilitytorestrictendsystemsthatposeathreattothenetwork,providespecialaccessto
particulardevices,andprovisionendsystems
orsetsofendsystemswithaccesstorequired
setsofnetworkresourcestoensurebusinesscontinuity.
User-Based Authorization
WiththisNACdeploymentmodel,endsystemscanbeauthorizedwithaccesstoaspecificset
ofnetworkresourcesbasedontheuserloggedintotheendsystemandtheirorganizational
rolewithintheenterprise.Forexample,auserwhoisanengineermaybeallocatedprioritized
accesstotheengineering
serversdeployedonthenetworkwhilebeingdeniedaccessto
serversutilizedbytheHRorlegaldepartments.Furthermore,auserwhoisknowntobe
launchingmaliciousattacksagainstcriticalresourcesonthenetworkorwasterminatedfrom
apositionwithinthecompanymaybeauthorizedarestrictiveset
ofnetworkresourcesor
outrightdeniednetworkaccess,regardlessofwhereandwhenthisuserconnectstothe
network.Incontrast,auserintheIToperationsgrouporatechniciansenttorepairadevice
onthenetworkmaybepermittedunrestrictedaccesstonetworkresourcesfor
troubleshootingandmaintenance
purposes,regardlessofwhereandwhentheuserconnects
tothenetwork,oronlyfrominsidetheNOC.
Insummary,userbasedauthorizationsupportstheprovisioningofnetworkresourcesto
connectingusersbasedontheuserʹsidentityandsuccessfulauthentication,aswellastheir
locationonthenetwork,affording
suchcapabilitiesasdenyingusersthatposeathreattothe
network,providingparticularemployeeswithspecialaccess,andprovisioningusersin
generalwithappropriateaccesstotherequiredsetsofnetworkresources,toensurebusiness
continuity.
MAC Registration
EnterasysNACprovidessupportforMACRegistration,alsoknownasNetworkorGuest
Registration.Thissolutionforcesanynewendsystemconnectedonthenetworktoprovide
theuserʹsidentity inawebpageformbeforebeingallowedaccesstothenetwork,without
requiringtheinterventionofITop erations.This
meansthatendusersareautomatically
provisionednetworkaccessondemandwithouttimeconsumingandcostlyhelpdesk
requestsornetworkinfrastructurereconfigurations.
Inaddition,IToperationshasvisibilityintotheendsystemsandtheirregisteredusersonthe
network(forexample,guests,students,contractors,andemployees)withoutrequiringthe
deploymentofbackendauthenticationanddirectoryservicestomanagetheseusers.This
bindingbetweenuseridentityand machineisusefulforauditing,compliance,accounting,
andforensicspurposesonthenetwork.
Furthermore,MACRegistrationsupportsafunctionalityreferredtoas“sponsored
registration”requiringthatendusersareonlyallowedtoregisterto
thenetworkwhen
accompaniedbyatrustedsponsor;aninternalusertotheorganizationwithvalidcredentials.
Whenanenduserisregisteringtothenetwork,asponsormustenterausernameandpossibly