Enterasys Networks 9034385 Plumbing Product User Manual


 
Model 3: End-System Authorization with Assessment
2-8 NAC Deployment Models
ARADIUSserverisonlyrequiredifoutofbandnetworkaccesscontrolusingtheNACGateway,
orinlinenetworkaccesscontrolusingtheLayer2NACController,isimplementedwithweb
basedand/or802.1Xauthenticati on.
NetSightPolicyManagerisrequiredforallinlineNACdeployments,andrecommendedforout
of
bandNACdeploymentsthatutilizeEnterasyspolicycapableswitches.PolicyManager
providestheabilitytocentrallydefineandconfiguretheauthorizationlevelsorpolicies.
NetSightInventoryManagerisanoptionalcomponent,providingcomprehensivenetwork
inventoryandchangemanagementcapabilities.
Model 3: End-System Authorization with Assessment
ThisNACdeploymentmodelimplementsthedetection,authentication,assessmentand
authorizationNACfunctionalitiesforconnectingendsystems.InModel2,endsystemsandend
usersconnectedtothenetworkareauthorizedbasedonthedeviceidentity,useridentity,and/or
locationinformation.Model3extendstheauthorizationdecisioninNACtoone
additional
dimensionthesecuritypostureoftheendsystemasdeterminedfromanassessment.The
assessmentcanbeexecutedthroughagentbasedoragentlesstechniquesandcanidentify
differentpiecesofinformationaboutthedevice,suchanantivirussoftwareconfiguration,
operatingsystempatchesinstalled,softwareapplicationsinstalledand
running,processes
running,servicesconfigured,andregistryvaluesset.
ItisimportanttonotethatitisnotnecessarytoconfiguretheEnterasysNACsolutionto
quarantineendsystemsthatfailassessment.Infact,duringtheinitialrolloutofNAConthe
enterprisenetwork,itishighlyrecommendedthatendsystems
arenotrestrictedaccesstothe
networkinanywaybefore,during,orafterfailedassessment.ThispassiveNACconfiguration
allowstheITadministratortobaselinetheconfigurationofdevicesonthenetworkand
understandthecurrentlandscapeofitsassetswithoutimpactingnetworkconnectivityfor
connectingendsystems.Inthis
configuration,itisnotnecessarytoinformtheendusersthatthey
arebeingassessedorhavefailedassessmentbecausethereislittletonoimpactonnetwork
connectivityduringthisassessment.Endsystemscanbescannedinthebackgroundproviding
thenetworkadministratorwithimportantvisibilityintohowdevices
areconfiguredontheir
network,whileenduserscanutilizethenetworkasdesired.Then,whenthenetwork
administratorisready,theEnterasysNACsolutioncanbeconfiguredwiththeclickofabuttonto
immediatelyrestrictaccessforendsystemsthathavefailedassessment.
Implementation
InModel3,endsystemscanbedetectedandtracked,authenticated,assessed,andauthorizedin
differentwaysdependingonwhetherinlineoroutofbandnetworkaccesscontrolis
implementedintheEnterasysNACsolution.
Out-of-Band NAC
ForoutofbandEnterasysNACdeploymentsutilizingtheNACGateway,NACfunctionsare
implementedinthefollowingway:
Detection‐AsdescribedinModel2.
Authentication‐AsdescribedinModel2.
Assessment‐TheNACGatewaycanleverageeitherlocalassessmentservicesand/orremote
assessmentservicesdeployedonthenetwork.TheNACGatewayʹ
slocalassessmentservices
includeagentlessassessmentwhichcanexecutevariousserversidechecks(whetheranFTP