Enterasys Networks 9034385 Plumbing Product User Manual


 
Enterasys NAC Design Guide 4-1
4
Design Planning
ThischapterdescribesthestepsyoushouldtakeasyoubeginplanningyourNACdeployment.
Thefirststepistoidentifythedeploymentmodelthatbestmeetsyourbusinessobjectives.Then,
thecurrentnetworkinfrastructuremustbeevaluatedinordertodetermineNACcomponent
requirements.Basedonthisevaluation,youwill
beabletodecidewhethertodeployinlineorout
ofbandnetworkaccesscontrol.
Identify the NAC Deployment Model
WhenplanningyourNACdeployment,thefirststepistoidentifytheNACdeploymentmodel,or
aphasedimplementationofmultipledeploymentmodels,thatmeetsyourNACbusiness
objectives.Thefourdeploymentmodelsaresummarizedbelow.Formoreindepthinformationon
eachmodel,seeChapter 2,NACDeploymentModels.
•Model
#1:EndSystemDetectionandTracking
EnterasysNACdetectsdevicesastheyconnecttothenetwork,identifyingthelocation,MAC
address,IPaddress,andusernameofthepersonusingtheendsystem.Thisinformationis
maintainedovertimeforeachdeviceonthenetwork,yieldingcompletehistoricalinformation
aboutadevice
asitinteractswiththenetwork.
•Model#2:EndSystemAuthorization
EnterasysNACdetects,authenticates,andauthorizesconnectingendsystems,tocontrol
accesstonetworkresourcesbasedonlocationaswellasuserandendsystemidentity.
•Model#3:EndSystemAuthorizationwithAssessment
EnterasysNACisdeployedwithendsystemassessmentand
authorization(butwithout
remediation),tocontrolaccesstonetworkresourcesbasedonthesecuritypostureofa
connectingendsystem.Compliantendsystemsarepermittedontothenetwork,whileend
systemsthatfailassessmentcanbedynamicallyquarantinedwithrestrictivenetworkaccess.
•Model#4:EndSystemAuthorizationwithAssessmentandRemediation
Inadditiontoendsystemassessmentandauthorization,EnterasysNACisdeployedwith
remediationtodynamicallyinformquarantinedendsystemsofsecuritycompliance
violations.Usingwebbasednotification,assistedremediationallowsendusersthathave
For information about... Refer to page...
Identify the NAC Deployment Model 4-1
Survey the Network 4-2
Identify Inline or Out-of-band NAC Deployment 4-11
Summary 4-11