Enterasys Networks 9034385 Plumbing Product User Manual


 
Enterasys NAC Design Guide 3-1
3
Use Scenarios
ThischapterdescribesfourNACusescenariosthatillustratehowthetypeofNACdeploymentis
directlydependentontheinfrastr ucturedevicesdeployedinthenetwork.Forsomenetwork
topologies,inlinenetworkaccesscontrolutilizingtheNACControllermayberequiredwhilefor
othernetworkconfigurations,theNACGatewayimplementingout
ofbandNACmaybeused.
TheEnterasysNACsolutioniscapableofimplementingnetworkaccesscontrolforallfouruse
scenariosaswellasenvironmentswithmixedusescenariosthatmayrequiretheconcurrent
deploymentoftheNACGatewayandtheNACController.Regardlessofthescenariothatis
deployed,
allNACGatewaysandNACControllersarecentrallymanagedbytheNetSightNAC
Managersoftwareapplication.
Fortheintelligentwiredaccessedgeandintelligentwirelessaccessedgeusescenarios,theterm
“intelligent”referstoanetworktopologywheretheaccessedgeiscomposedofEnterasyspolicy
enabledswitchescapableofsupporting
authenticationandpolicyenforcement,orthirdparty
switchescapableofsupportingauthenticationanddynamicVLANassignmentasdefinedinRFC
3580.
Scenario 1: Intelligent Wired Access Edge
Intheintelligentwiredaccessedgeusescenario,theedgeswitchesthatcomposethenetwork
accesslayerarecapableofprovidingauthentication(802.1X,webbased,orMAC)forconnecting
endsystems,andtheyarealsocapableofbeinganauthorizat ion pointfortheseendsystems
throughEnterasyspolicyand/ordynamicVLAN
assignmentasspecifiedinRFC3580.
Forthisusescenario,theNACGatewayapplianceisdeployedforoutofbandnetworkaccess
control,leveragingtheintelligentinfrastructuredevicesintheaccessedgeastheauthorization
pointforconnectingendsystems.
ItisimportanttonotethatEnterasyspolicyenabledswitchesprovide
increasedsecurityover
thirdpartyswitchesthatsupportRFC3580.Byusingportlevelgranulartrafficcontrol,users
quarantinedwithEnterasyspolicycanberestrictedfromcommunicatingwithotherquarantined
users,evenifcolocatedonthesameVLAN.InaQuarantineVLANasimplementedonthird
partyRFC3580
capableswitches,aquarantineduserposesathreattootherquarantinedusers
For information about... Refer to page...
Scenario 1: Intelligent Wired Access Edge 3-1
Scenario 2: Intelligent Wireless Access Edge 3-5
Scenario 3: Non-intelligent Access Edge (Wired and Wireless) 3-9
Scenario 4: VPN Remote Access 3-11
Summary 3-13