Enterasys Networks 9034385 Plumbing Product User Manual


 
Procedures for Out-of-Band and Inline NAC
5-12 Design Procedures
3. Identify Required MAC and User Overrides
MACanduseroverridesareusedtohandleendsystemsthatrequireadifferentsetof
authentication,assessment,andauthorizationparametersfromtherestoftheendsystemsina
SecurityDomain.AMACoruseroverridecanbedefinedwithinthescopeofaspecificSecurity
DomainorallSecurity
Domains.AnoverridescopedtoaspecificSecurityDomainletsyou
specifyhowanendsystemisauthenticated,assessed,andauthorizedwhenevertheendsystem
connectstothenetworkinthatparticularSecurityDomain.Aglobaloverrideletsyouspecifyhow
anendsystemisauthenticated,assessed,andauthorizedwhenever
theendsy stemconnectsto
anySecurityDomainonthenetwork.
UsethenetworkscenariosandexamplesprovidedinthissectiontodeterminewhatMACand
useroverridesarerequiredforyourNACdeployment.
MAC Overrides
AMACoverrideletsyoucreateaconfigurationforasingleendsystem(basedonafullMAC
address)orforagroupofendsystems(basedonaMACOUI,aMACOUIGrouporaCustom
MACMask).Forexample,youcouldcreateaMACoverridethatallocatesVoIP
servicestocertain
IPphonesbasedonaMACOUIgroup.Or,youcoulddenyaspecificendsystembycreatinga
MACoverridethatquarantinestheMACaddressofthatendsystemandrestrictsitsnetwork
access.