Enterasys-networks 9034385 Instrukcja Użytkownika Strona 33

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 98
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 32
Model 3: End-System Authorization with Assessment
Enterasys NAC Design Guide 2-11
•Applicationconfiguration
TheNACsolutioncandeterminewhichservicesandapplicationsareinstalledandenabledon
theendsystem.Certainapplicationsshouldberemovedfromthedevicepriortoestablishing
connectivitybecausetheymayhaveanegativeimpactontheoperationoftheendsystem,
distracttheenduserfrombusiness
functions,orbeusedtolaunchattacksonthenetwork.
Furthermore,particularservicesmaybeoutdatedandvulnerabletoattack.Theseservices
shouldeitherbeupdatedordisabledtominimizetherisktoconnectingendsystemsonthe
network.TheNACsolutionfacilitatesthisreconfigurationofapplicationsonanend system
priortonetworkconnection,toensuremaximumsecurityandproductivitywhenthede vice
connects.
Diverse Security Posture Compliance Verification
InorderforaNACsolutiontobeeffective,inclusionofallendsystemsinthenetwork
environmentmustbeaddressedwhendetecting,authenticating,assessing,andauthorizing
devices.TheEnterasysNACsolutionsupportsadiverseendsystemenvironment,and
providesintegratedsecurityandmanagementregardlessofwhattypeofdevicesare
connectedtothebusinessnetwork.
Enterasysleveragestwoassessmentmodels:agentbasedandagentless.Anagentbased
assessmentandanagentlessassessmentarebothcriticaltoensuringthatanyendsystemof
anytypecanbeincludedintheNACprocess.Thereareseveralreasonswhybothassessment
modelsarecriticaltoacompleteNACsolution.Securityagentsloadedontomanagedend
systemsofferextensiveassessmentcapabilities.Ifanagentisrequired,anewendsystem
connectingtothenetworkthathasnotdownloadedtheagentcanbequarantinedand
redirectedtoawebpage.Thewebpageprovides
informationonhowtheagentcanbe
downloadedandinstalledontheendsystemtobeginitsassessment.
However,therearetypesofendsystemsinatypicalnetworkthatmaynotbeabletoloada
softwareagent,suchasIPphones,securi tycameras,orprinters.Ifasecurity
agentisnot
availableforadevice(ortheoperatingsystemsrunningthedevice),anagentlessapproachis
theonlywaytoassesstheendsystem.Inaddition,considerendsystemsthatcouldnormally
holdanagent,butarenotunderthecontroloftheITorganization.Inthecase
ofguest
networkingthatprovidessupportforcontractors,vendors,andthepublic,thedesiremaybe
tosupportminimalorspecificnetworkservices,butstillensurethesafetyandsecurityofthe
networkandthepeopleusingit.Itisnotenoughtosimplyuseanetworkusagepolicyto
restricttheservicesaguestuserisallowedtoaccess.Becausetheguestisleveragingthesame
networkinfrastructureasthecriticalbusinessusers,itisimportantthatproactivesecurity
measuresareappliedtotheguestjustastheyaretoamanageduser.Thisisanothercase
whereanagent
lessapproachtoendsystemassessmentcanbecriticaltoensuringa
comprehensiveNACstrategy.
Boththeagentbasedandtheagentlessassessmentmodelscanbedeployedandintegrated
togetherintheEnterasysNACsolution.
Przeglądanie stron 32
1 2 ... 28 29 30 31 32 33 34 35 36 37 38 ... 97 98

Komentarze do niniejszej Instrukcji

Brak uwag