Enterasys-networks 9034385 Instrukcja Użytkownika Strona 23

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 98
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 22
Enterasys NAC Design Guide 2-1
2
NAC Deployment Models
ThischapterdescribesthefourNACdeploymentmodelsandhowtheybuildoneachotherto
provideacompleteNACsolution.ThefirstmodelimplementsasubsetofthefivekeyNAC
functions(asdescribedinChapter 1),andeachsubsequentmodelprovidesadditional
functionalitywithouttheneedtoreplaceexisting
piecesoftheNACsolution.Thisallows
businesseswhoarestillintheearlystagesofNACdeployment,totakeaphasedapproachto
implementingNACwhilederivingvaluefromthesolutionateachstepalongtheway.
Model 1: End-System Detection and Tracking
ThisNACdeploymentmodelimplementsthefirstkeyNACfunction,detection.Thedetectionof
connectingendsystemsprovidesthenetworkadministratorwithvisibilityintowhatdevicesare
connectingtothenetwork,whoisusingthesedevices,andwherethedevicesareconnected.
FormanyNACdeployments,thefirstphaseconsistsof
trackingovertimetheendsystemsand
endusersconnectedtothenetwork,inordertoprofileandenumeratetheassetsontheenterprise
network.Itisimportanttonotethatinthismodel,theNACsolutiondoesnotplayapartin
authorizingaccessforconnectingendsystems,leavingthis
tothedefaultconfigurationsonthe
switch.Theendsystemsconnecttothenetworkandareallocated“businessasusual”accessto
networkresources,whiletheNACsolutionprovidesvisibilityintotheconnectionbehaviorand
detailsofthesedevices.
Implementation
Endsystemscanbedetectedandtrackedindifferentwaysdependingonwhetherinlineoroutof
bandnetworkaccesscontrolisimplemented.
Out-of-Band NAC
ForoutofbandNACutilizingtheNACGatewayappliance,detectionisimplementedasfollows.
Inthecaseofwebbasedor802.1Xauthentication,endsystemsaredetectedwiththereceiptof
RADIUSpacketsfromanaccessedgeswitchattemptingtoauthenticateanendsystem.The
For information about... Refer to page...
Model 1: End-System Detection and Tracking 2-1
Model 2: End-System Authorization 2-3
Model 3: End-System Authorization with Assessment 2-8
Model 4: End-System Authorization with Assessment and Remediation 2-12
Summary 2-16
Przeglądanie stron 22
1 2 ... 18 19 20 21 22 23 24 25 26 27 28 ... 97 98

Komentarze do niniejszej Instrukcji

Brak uwag