Enterasys Networks 9034385 Plumbing Product User Manual


 
Survey the Network
Enterasys NAC Design Guide 4-5
tolocallyauthorizeallMACauthenticationrequestsforconnectingendsystems,therebynot
requiringalistofknownMACaddresses.Infact,EnterasysNACcanbeconfiguredina“learning
mode”todynamicallylearntheMACaddressesofalldevicesconnectingtothenetwork,
permittingnetworkaccesstoallofthese
endsystemsforaperiodoftime.
AftertheMACaddressesarelearned,NACcanbereconfiguredtopermitaccessonlytothese
endsystems,requiringallotherdevicesconnectingtothenetworktogothrougharegistration
process.
WithMACauthenticationdeployedonthenetwork,abackendRADIUSserver
withassociated
directoryservicesisnotrequired,simplifyingtheimplementation.Furthermore,becauseMAC
authenticationonlyrequirestheendsystemtogenerateanEthernetpacketontothenetwork,both
humancentricandmachinecentricendsystemshavethecapabilitytoauthenticatetothe
network,regardlessofwhethertheendsystemisa
PCoraprinter.
Case #2: Authentication methods are deployed on the network.
Ifauthenticationiscurrentlydeployedonthenetworkwith802.1X,webbased,and/or MAC
authentication,thenaRADIUSserverwithassociatedbackenddirectoryservicesmustbe
deployedforuser/device802.1Xand webbasedcredentialvalidation.Moreover,ifRADIUS
authenticationforswitchmanagementloginsisimplemented,aRADIUSservermustbedeployed
onthenetwork.Inthisscenario,outofbandNACisconfiguredtoseamlesslyproxyRADIUS
authenticationrequestsreceivedfromtheswitchesattheintelligentedgeofthenetworktothe
backendRADIUSserver,withoutrequiringcomplexconfigurationchangestotheRADIUSserver
andassociateddirectoryservices.Inaddition,NAC
canalsobeconfiguredtolocallyauthorize
MACauthenticationrequests.
Overview of Supported Authentication Methods
FollowingisanoverviewofauthenticationmethodssupportedbyEnterasysandsomethirdparty
switches,andproxiedbyoutofbandNAC.
802.1XAuthentication
TheIEEE802.1Xstandardforportbasednetworkaccesscontrol,providesnetworkadministrators
withtheabilitytoauthenticateandauthorizeanenduserattheportlevel.
The
802.1XauthenticationmethodisusuallyimplementedonPCsinsecureenvironmentsand
requiresthattheendsystemimplementan802.1X supplicant,whichisspecialsoftwarethat
communicatesinthisprotocol.
Because802.1Xrequirestheinputofusercredentials,802.1Xisnormallyusedonusercentricend
systemsthathaveaconcept
ofanassociateduser,suchasaPC.Therefore,thisauthentication
methodmaybeinappropriateformachinecentricdevices,suchasprintersandIPcameras.
However,newersoftwarereleasesforIPphonesmayincludean802.1Xsupplicant.
SinceEnterasysNAConlyactsasapassthroughtoanupstreamRADIUSServer,
itismandatory
thatafullauthenticationdeploymentisconfiguredonthenetworkif802.1Xisused.
WebBasedAuthentication
Webbasedauthentication,orPortWebAuthentication(PWA),isanauthenticationprocessthat
usesawebbrowser,userloginprocesstogainaccesstoports.ItemployseitherCHAP(Challenge
Handshake
AuthenticationProtocol)orPAP(PasswordAuthenticationProtocol).
Sincewebbasedauthenticationonlyrequiresthatawebbrowserisontheendsystem,itis
deployedinheterogeneousenvironmentswherecertainendsystemsmaynothavean802.1X
supplicantinstalled.