Enterasys-networks 9034385 Instrukcja Użytkownika Strona 56

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 98
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 55
Survey the Network
4-4 Design Planning
FortheinlineimplementationoftheEnterasysNACsolution,theNACControllerauthenticates
andauthorizesendsystemslocallyontheappliance,anddoesnotrelyonthecapabilitiesof
downstreaminfrastructuredevices.Becauseofthis,theNACControllercanbeutilizedin
networkswherenonintelligentand/orintelligentinfrastructuredevicesexist
attheedgeofthe
network.Ifthenetworkdoesnothaveanintelligentedge,thentheNACControllermustbe
deployedinordertoprovidetheauthenticationandauthorizationcapabilitiesrequiredfor
implementingnetworkaccesscontrol,asshowninFigure 42.
Figure 4-2 Network with Non-Intelligent Edge
2. Evaluate Policy/VLAN and Authentication Configuration
Foranetworkwithanintelligentedge,thesecondstepinsurveyingyournetworkistoevaluate
thenetworkauthenticationmethodcurrentlybeingused,andhowthedeploymentofEnterasys
NACwillaffectit.Anetworkwithanintelligentedgecanbeclassifiedintooneoftwocases:either
authenticationis
deployedonthenetworkoritisnot.
Case #1: No authentication method is deployed on the network.
Ifauthenticationisnotconfiguredonthenetwork,outofbandNACcanbedeployedwith
minimalconfigurationbyim plementingMACauthenticationontheintelligentedgeofthe
network(iftheedgeswitchessupportMACauthentication).TheNACGatewaycanbeconfigured
Note: This step is not necessary if in step 1 you determined that the network does not have an
intelligent edge and the inline NAC Controller appliance will be deployed to provide the
authentication and policy enforcement capabilities.
Przeglądanie stron 55
1 2 ... 51 52 53 54 55 56 57 58 59 60 61 ... 97 98

Komentarze do niniejszej Instrukcji

Brak uwag