Enterasys Networks 9034385 Plumbing Product User Manual


 
Additional Considerations
Enterasys NAC Design Guide 5-33
assessmentserverstoreachtheendsystemwhileitisbeingassessed,regardlessofwhetherthe
Assessingpolicy,EnterpriseUserpolicy,oranyotherpolicyroleisutilizedfor assessment.
TheQuarantinePolicyisusedtorestrictnetworkaccesstoendsystemsthathavefailed
assessment.TheQuarantinepolicyroleis
configuredbydefaultontheNACControllertobeused
astheQuarantinePolicyinNACManager.Thispolicyisrestrictive,allowingDNSandDHCP,and
redirectingwebtraffictoservebackawebpagestatingtheendsystemhasbeenrestrictedaccess
becauseitisdeemednoncompliant.Allothertypes
oftrafficarediscarded.Ifitisdesiredtoopen
networkaccesswhenanendsystemfailstheassessment,theuseoftheQuarantinePolicycanbe
disabledintheNACConfigurationortheEnterpriseUserpolicyrolecanbeselectedasthe
QuarantinePolicy.
Unregistered Policy
IfMAC(network)registrationistobeconfiguredonLayer2NACControllers,theUnregistered
policyroleconfiguredbydefaultontheNACControllercanbeusedfortheAcceptPolicyof
unregistereddevices.Thispolicyisrestrictive,allowingDNSandDHCP,andredirectingweb
traffictoservebackaregistration
webpagestatingtheendsystemhasbeenrestrictedaccess
becauseithasnotyetregistered.Allothertypesoftrafficarediscarded.
Additional Considerations
ThissectionpresentsadditionaldesignconsiderationsforbothinlineandoutofbandNAC
deployments.
NAC Deployment With an Intrusion Detection System (IDS)
NACdeploymentsthatimplementendsystemassessmentcomplementnetworking
environmentswithIDStechnologiesthatdetectrealtimesecurityeventsonthenetwork.While
endsystemassessmentdeterminesthesecuritypostureofconnectingdevicesand mitigates
threatsposedbyvulnerableendsystems,itdoesnotdeterminetheenduserʹsintentions,whether
maliciousorbenevolent.Therefore,IDStechnologiescanmonitorhowanendsystemutilizes
networkresourcesafterNAChasvalidatedthesecurityposturecomplianceoftheendsystem.
However,endsystemassessmentsutilizedinNACmaybeclassifiedbyanIDS(dependingonits
configuration)asanattack.Therefore,ifthe
trafficfromtheassessmentservertraversesanetwork
linkthatismonitoredbyanIDSsensor,theIDSmustbeconfiguredtonotgeneratesecurityevents
fortrafficsourcedfromtheassessmentserver’sIPaddress.ThesameappliesforIPSsystems.
NAC Deployment With NetSight ASM
NetSightASMcanbeconfiguredtonotifythelocallyinstalledNACManagertodynamically
configureaMACoverrideforathreatMACaddressonthenetwork.Whenasecuritythreatis
detectedonthenetwork,eitherthroughEnterasysDragonIDSorathirdpartydevice,andthe
securitythreatiscommunicated
toNetSightASMforanautomatedresponse,ASMcanthen
quarantinethesourceoftheattackat theportofconnectionusingpolicy,andalsocommunicate
thisquarantineactiontoNAC.Iftheendsystemsourcingthesecuritythreatmovestoadifferent
portonthenetwork,theendsystem
willremainquarantined,duetoadynamicallyconfigured
MACoverride,toprotectthenetworkfromthepossibilityoffutureattacks.Therefore,the
deploymentofNACnotonlyproactivelyprotectsthenetworkfromsecuritythreatsposedby
vulnerableendsystems,butitalsoempowersthenetworkʹsdynamicresponsecharacteristicsto
real
timethreatsdetectedfromendsystems.