Enterasys Networks 9034385 Plumbing Product User Manual


 
Scenario 4: VPN Remote Access
Enterasys NAC Design Guide 3-11
Scenario 3 Implementation
Inthenonintelligentaccessedgeusescenario,thefiveNACfunctionsareimplementedinthe
followingmanner:
1.Detection‐Theuserʹsendsystemconnectstothenetworkandtransmitsdatatrafficontothe
networkthattraversestheNACController.ThistrafficissourcedfromaMACaddressorIP
addressnotpreviouslyseenbythecontroller.
2.Authentication‐OneoftwoconfigurationsmaybeimplementedontheNACControllerfor
enduserauthentication.Authenticationcanbedisabledaltogether,trustingthatthedownstream
infrastructuredevicesauthenticated theendsystemtothenetwork(802.1Xauthenticationtothe
wirelessLAN,webbasedauthentication
tothewiredLAN).Alternatively,MACregistrationcan
beimplemented,whereanenduserusernameandpasswordand/orsponsorusernameand
passwordmustbevalidatedagainstabackendLDAPcompliantdatabasebeforenetworkaccessis
permitted.
3.Assessment‐Aftertheidentityoftheendsystemorenduserisvalidatedby
authentication,the
NACControllerrequestsanassessmentoftheendsystemaccordingtopredefinedsecuritypolicy
parameters.Theassessmentcanbeagentbasedoragentless,andisexecutedlocallybytheNAC
Controllerʹsassessmentfunctionalityand/orremotelybyapoolofassessmentservers.
4.Authorization‐Onceauthenticationandassessment
arecomplete,theNACController
allocatestheappropriatenetworkresourcestotheendsystembasedonauthenticationand/or
assessmentresults.ThisisimplementedlocallyontheNACControllerbyassigningapolicyto
trafficsourcedfromthisendsystem.Ifauthenticationfailsand/ortheassessmentresultsindicate
anoncompliantendsystem,
theNACControllercaneitherdenytheendsystemaccesstothe
networkorquarantinetheendsystembyspecifyingaparticularpolicyontheNACController.
5.Remediation‐Whenthequarantinedenduseropensawebbrowsertoanywebsite,itstrafficis
dynamicallyredirectedtoaRemediationweb
pagethatdescribesthecomplianceviolationsand
providesremediationsstepsfortheusertoexecuteinordertoachievecompliance.Aftertaking
theappropriateremediationsteps,theenduserclicksonabuttononthewebpagetoreattempt
networkaccess,forcingthereassessmentoftheendsystem.At
thispoint,theEnterasysNAC
solutiontransitionstheendsystemthroughtheentireNACcycleofdetection,authentication,
assessment,andauthorization,reassessingthesecuritypostureoftheendsystemtodetermineif
theremediationtechniquesweresuccessfullyfollowed.Iftheendsystemisnowcompliant,the
NACControllerauthorizesthe
endsystemwiththeappropriateaccesspolicy.Iftheendsystemis
notcompliant,theendsystemisrestrictedaccesstothenetworkbyassigningapolicytotheend
systemontheNACController,andtheprocessstartsagain.
Scenario 4: VPN Remote Access
IntheVPNremoteaccessusescenario,VPNconcentratorsactasaterminationpointforremote
accessVPNtunnelsintotheenterprisenetwork.
Forthisusescenario,theNACControllerapplianceisdeployedtoauthorizeconnectingend
systemsonthenetworkandimplementnetworkaccesscontrol.
Thefollowingfigureillustrateshowthe
NACControllerandtheotherEnterasysNAC
componentsworktogetherinaVPNremoteaccessdeploymenttoprovideacomprehensiveNAC
solution.