Enterasys Networks 9034385 Plumbing Product User Manual


 
Summary
4-12 Design Planning
server.Inaddition,NACcanalsobeconfiguredtolocallyauthorizeMACauthentication
requests.
3. Identifythestrategicpointinthenetworkwhereendsystemauthorizationshouldbe
implemented.
Themostsecureplaceforimplementingauthorizationisdirectlyatthepointofconnectionat
theedgeofthenetwork,assupportedby
Enterasyspolicycapableswitches.Inthis
configuration,theimplementationofoutofbandNACusingtheNACGatewayappliance
leveragespolicyonEnterasysswitchestosecurelyauthorizeconnectingendsystems.
Ifthenetworkinfrastructuredoesnotcontainintelligentdevicesattheedgeordistribution
layer,theninlineNACusingtheNAC
Controllerastheauthorizationpointforconnecting
endsystemsmustbeimplemented.
4. Identifythenetworkconnectiontypesbeingused.Thepreviousstepshavebeenconcerned
withimplementingNACfortheinternalLAN.Inthisstep,thefollowingconnectiontypesare
discussedalongwiththeirimpactontheEnterasysNACsolution.
–Wired
LAN
WirelessLAN
–RemoteAccessWAN
–SitetoSiteVPN
–RemoteAccessVPN
BasedontheNACdeploymentmodelyouselect,andtheresultsofyournetworkinfrastructure
evaluation,youwillbeabletoidentifywhetheroutofbandNACorinlineNACwillbedeployed
inthedifferentareasofyournetwork.