Enterasys Networks 9034385 Plumbing Product User Manual


 
v
Unregistered Policy ..........................................................................................................................5-28
Inline NAC Design Procedures ..................................................................................................................... 5-28
1. Determine NAC Controller Location ................................................................................................... 5-28
2. Determine the Number of NAC Controllers ........................................................................................ 5-30
3. Identify Backend RADIUS Server Interaction ..................................................................................... 5-32
4. Define Policy Configuration ................................................................................................................ 5-32
Failsafe Policy and Accept Policy Configuration ..............................................................................5-32
Assessment Policy and Quarantine Policy Configuration.................................................................5-32
Unregistered Policy ..........................................................................................................................5-33
Additional Considerations ............................................................................................................................. 5-33
NAC Deployment With an Intrusion Detection System (IDS) ................................................................. 5-33
NAC Deployment With NetSight ASM .................................................................................................... 5-33
Figures
3-1 Intelligent Wired Access Edge with Enterasys Policy-Enabled Devices............................................. 3-2
3-2 Intelligent Wired Access Edge with RFC 3580 Capable Devices....................................................... 3-3
3-3 Intelligent Wireless Access Edge - Thin APs with Wireless Switch.................................................... 3-6
3-4 Intelligent Wireless Access Edge - Intelligent AP (RFC 3580 Compliant ........................................... 3-7
3-5 Non-intelligent Access Edge (Wired and Wireless) .......................................................................... 3-10
3-6 VPN Remote Access ........................................................................................................................ 3-12
4-1 Network with Intelligent Edge ............................................................................................................. 4-3
4-2 Network with Non-Intelligent Edge ..................................................................................................... 4-4
5-1 Security Domain ................................................................................................................................. 5-3
5-2 NAC Configuration.............................................................................................................................. 5-4
5-3 NAC Configuration for a Security Domain .......................................................................................... 5-6
5-4 MAC and User Override Configuration............................................................................................. 5-13
5-5 NAC Gateway Redundancy.............................................................................................................. 5-21
5-6 Policy Role Configuration in NetSight Policy Manager..................................................................... 5-26
5-7 Service for the Assessing Role......................................................................................................... 5-27
5-8 Service for the Quarantine Role ....................................................................................................... 5-28
5-9 Layer 2 NAC Controller Redundancy ............................................................................................... 5-31
5-10 Layer 3 NAC Controller Redundancy ............................................................................................... 5-31
Tables
1-1 Component Requirements for NAC Deployment Models ................................................................... 1-4
1-2 Comparison of Appliance Functionality .............................................................................................. 1-7
1-3 Comparison of Appliance Advantages and Disadvantages................................................................ 1-8
2-1 Component Requirements for Detection and Tracking ...................................................................... 2-3
2-2 Component Requirements for Authorization ...................................................................................... 2-7
2-3 Component Requirements for Authorization with Assessment ........................................................ 2-12
2-4 Component Requirements for Authorization with Assessment and Remediation ............................ 2-15
2-5 Enterasys NAC Deployment Models ................................................................................................ 2-16
3-1 Use Scenario Summaries................................................................................................................. 3-13
5-1 Security Domain Configuration Guidelines......................................................................................... 5-7
5-2 Security Domain Configuration Guidelines for Assessment ............................................................. 5-10
5-3 MAC Override Configuration Guidelines .......................................................................................... 5-14
5-4 End-System Limits for NAC Gateways............................................................................................. 5-20
5-5 End-System Limits for NAC Controllers ........................................................................................... 5-30