Enterasys-networks 9034385 Instrukcja Użytkownika Strona 64

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 98
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 63
Summary
4-12 Design Planning
server.Inaddition,NACcanalsobeconfiguredtolocallyauthorizeMACauthentication
requests.
3. Identifythestrategicpointinthenetworkwhereendsystemauthorizationshouldbe
implemented.
Themostsecureplaceforimplementingauthorizationisdirectlyatthepointofconnectionat
theedgeofthenetwork,assupportedby
Enterasyspolicycapableswitches.Inthis
configuration,theimplementationofoutofbandNACusingtheNACGatewayappliance
leveragespolicyonEnterasysswitchestosecurelyauthorizeconnectingendsystems.
Ifthenetworkinfrastructuredoesnotcontainintelligentdevicesattheedgeordistribution
layer,theninlineNACusingtheNAC
Controllerastheauthorizationpointforconnecting
endsystemsmustbeimplemented.
4. Identifythenetworkconnectiontypesbeingused.Thepreviousstepshavebeenconcerned
withimplementingNACfortheinternalLAN.Inthisstep,thefollowingconnectiontypesare
discussedalongwiththeirimpactontheEnterasysNACsolution.
–Wired
LAN
WirelessLAN
–RemoteAccessWAN
–SitetoSiteVPN
–RemoteAccessVPN
BasedontheNACdeploymentmodelyouselect,andtheresultsofyournetworkinfrastructure
evaluation,youwillbeabletoidentifywhetheroutofbandNACorinlineNACwillbedeployed
inthedifferentareasofyournetwork.
Przeglądanie stron 63
1 2 ... 59 60 61 62 63 64 65 66 67 68 69 ... 97 98

Komentarze do niniejszej Instrukcji

Brak uwag