Enterasys-networks 9034385 Instrukcja Użytkownika Strona 24

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 98
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 23
Model 1: End-System Detection and Tracking
2-2 NAC Deployment Models
RADIUSAccessAcceptorAccessRejectmessagereceivedfromtheupstreamRADIUSserver,is
returnedwithoutmodificationtotheaccessedgeswitch,topermitendsystemaccesstothe
network.ForMACauthentication,aRADIUSAccessAcceptmessageisreturnedtotheaccess
edgeswitchwithoutmodification,basedonaRADIUS
AccessAcceptmessagereceivedfromthe
upstreamRADIUSserverorlocalauthorizationofMACauthenticationrequests.The
authenticatingendsystemisprovidedaccesstothenetworkbasedontheconfigurationofthe
accessedgeswitch.
Inline NAC (Layer 2)
ForinlineNACutilizingtheLayer2NACController,anendsystemcanbedetectedinmultiple
ways.Anendsystemcanbedetectedsimplybytransmittingdatatra ff icnotpreviouslyseenby
theNACcontroller.Inthiscase,thetraffic isforwardedthroughtheNACControllertothetraffic
destination,
andhasnoimpactontheconnectivityoftheendsystem.Inanothermethod,end
systemsaredetectedwiththeauthenticationofdownstreamendsystemsvia802.1X,webbased,
and/orMACauthenticationontheNACController.Theseauthenticationrequestsmayormaynot
beproxiedupstreamdependingontheNAC
configuration.
Inline NAC (Layer 3)
ForinlineNACutilizingtheLayer3NACController,anendsystemisdetectedsimplyby
transmittingdatatrafficsourcedfromanIPaddressnotpreviouslyseenbytheNACcontroller.
ThetrafficisforwardedthroughtheNACcontrollertothetrafficdestination,andhasnoimpact
ontheconnectivityof
theendsystem.
Features and Value
TherearetwokeypiecesoffunctionalityandvaluepropositionssupportedbyModel1:
End-System and User Tracking
Model1supportstheabilitytotrackendsys temsbyMACaddress,asthedevicemovesfrom
switchporttoswitchport,andmapthedeviceidentitytoitsIP addresseverytimeitconnects.
Furthermore,theassociatedusercanalsobemappedtothedeviceandIPaddress,aslong
asa
usernamebasedauthenticationmethod(802.1Xorwebbasedauthenticati on)orMAC
RegistrationisimplementedwiththeNACGateway,orifendusersareconfiguredtologinto
aMicrosoftWindowsdomainwiththeNACControllerusingKerberossnooping
functionality.
Usingthesemethods,theEnterasysNACsolutioncanidentify
who,what,when,andwhere
devicesandusersconnecttothenetwork.Thisinformationismaintainedcentrallyinthe
NetSightNACManagerdatabase,providingimportanthistoricaldatathatcanbeusedfor
auditingortroubleshootingpurposes.Inaddition,thisinformationcanbeeasilysearchedto
identifywhichportaparticularuser
iscurrentlyconnectedtoonthenetwork,orwhichdevice
iscurrentlyallocatedaparticularIPaddress.Thisbinding(IPaddress,MACaddress,
username,location),whichismaintainedovertimeforeachendsystem,isusefulfor
complianceandauditingpurposes,andforplanningthesubsequentrolloutofthenext
NAC
deploymentmodel.
IP-to-ID functionality for Security Information Management (SIM)
ThisNACdeploymentmodelenablesSIMsystemssuchastheEnterasysDragonSecurity
CommandConsole(DSCC),todisplayuserfocusedinformationaboutassetsonthenetwork.
Traditionally,SIMsystemsyielddevicefocusedinformation(suchasIPaddress)about
detectednetworkthreats,throughthecorrelation,normalization,andprioritizationofevents
Przeglądanie stron 23
1 2 ... 19 20 21 22 23 24 25 26 27 28 29 ... 97 98

Komentarze do niniejszej Instrukcji

Brak uwag