Enterasys Networks 9034385 Plumbing Product User Manual


 
Model 3: End-System Authorization with Assessment
Enterasys NAC Design Guide 2-11
•Applicationconfiguration
TheNACsolutioncandeterminewhichservicesandapplicationsareinstalledandenabledon
theendsystem.Certainapplicationsshouldberemovedfromthedevicepriortoestablishing
connectivitybecausetheymayhaveanegativeimpactontheoperationoftheendsystem,
distracttheenduserfrombusiness
functions,orbeusedtolaunchattacksonthenetwork.
Furthermore,particularservicesmaybeoutdatedandvulnerabletoattack.Theseservices
shouldeitherbeupdatedordisabledtominimizetherisktoconnectingendsystemsonthe
network.TheNACsolutionfacilitatesthisreconfigurationofapplicationsonanend system
priortonetworkconnection,toensuremaximumsecurityandproductivitywhenthede vice
connects.
Diverse Security Posture Compliance Verification
InorderforaNACsolutiontobeeffective,inclusionofallendsystemsinthenetwork
environmentmustbeaddressedwhendetecting,authenticating,assessing,andauthorizing
devices.TheEnterasysNACsolutionsupportsadiverseendsystemenvironment,and
providesintegratedsecurityandmanagementregardlessofwhattypeofdevicesare
connectedtothebusinessnetwork.
Enterasysleveragestwoassessmentmodels:agentbasedandagentless.Anagentbased
assessmentandanagentlessassessmentarebothcriticaltoensuringthatanyendsystemof
anytypecanbeincludedintheNACprocess.Thereareseveralreasonswhybothassessment
modelsarecriticaltoacompleteNACsolution.Securityagentsloadedontomanagedend
systemsofferextensiveassessmentcapabilities.Ifanagentisrequired,anewendsystem
connectingtothenetworkthathasnotdownloadedtheagentcanbequarantinedand
redirectedtoawebpage.Thewebpageprovides
informationonhowtheagentcanbe
downloadedandinstalledontheendsystemtobeginitsassessment.
However,therearetypesofendsystemsinatypicalnetworkthatmaynotbeabletoloada
softwareagent,suchasIPphones,securi tycameras,orprinters.Ifasecurity
agentisnot
availableforadevice(ortheoperatingsystemsrunningthedevice),anagentlessapproachis
theonlywaytoassesstheendsystem.Inaddition,considerendsystemsthatcouldnormally
holdanagent,butarenotunderthecontroloftheITorganization.Inthecase
ofguest
networkingthatprovidessupportforcontractors,vendors,andthepublic,thedesiremaybe
tosupportminimalorspecificnetworkservices,butstillensurethesafetyandsecurityofthe
networkandthepeopleusingit.Itisnotenoughtosimplyuseanetworkusagepolicyto
restricttheservicesaguestuserisallowedtoaccess.Becausetheguestisleveragingthesame
networkinfrastructureasthecriticalbusinessusers,itisimportantthatproactivesecurity
measuresareappliedtotheguestjustastheyaretoamanageduser.Thisisanothercase
whereanagent
lessapproachtoendsystemassessmentcanbecriticaltoensuringa
comprehensiveNACstrategy.
Boththeagentbasedandtheagentlessassessmentmodelscanbedeployedandintegrated
togetherintheEnterasysNACsolution.