Enterasys-networks 9034385 Manual do Utilizador Página 12

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 98
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 11
NAC Solution Overview
1-2 Overview
Assessment
Determineifthedevicecomplieswithcorporatesecurityandconfigurationrequirements,suchas
operatingsystempatchrevisionlevelsandantivirussignaturedefinitions.Othersecurity
compliancerequirementsmightincludethephysicallocationofthedeviceandthetimeofdaythe
connectionattemptismade.
Authorization
Determinetheappropriatenetworkaccessfortheconnectingdevicebasedontheauthentication
and/orassessmentresults,andenforcethisauthorizationleveltotheendsystem.The
authorizationlevelcanbedeterminedbasedonthedeviceʹslocation,MACaddress,andsecurity
posture(asdeterminedbytheassessmentresults),inadditionto
theidentityoftheuser/device
validatedthroughauthentication.
Theendsystemcanbeauthorizedfornetworkaccessusingdifferenttechniques,suchas
reconfiguringaccessedgeswitchesorleveragingaspecializedNACappliancedeployedinthe
transmissionpathofendsystemdatatraffic.InlineandoutofbandNACimplementationsuse
differenttechniquesforauthorizingendsystemsonthenetwork,eachwithuniqueadvantages
anddisadvantagesasdiscussedlaterinthischapter.
Remediation
EnableenduserstosafelyremediatetheirnoncompliantendsystemswithoutimpactingIT
operations.Withremediation,userscanbenotifiedwhentheirsystemisquarantinedfornetwork
securitypolicynoncompliance,andtheycanbedirectedtoperformselfserviceremediation
techniquesspecifictothe detectedcomplianceviolation.Notificationmethods
includeweb
redirectionviaacaptiveportal,emailnotification,popupmessages,andmessengerservice
integration,amongothers.
Theremediationprocessincludesupdatingthedevicetomeetcorporatesecurityrequirements
(forexample,updatingoperatingsystempatchesandantivirussignatures)and reinitiatingthe
networkaccessprocess.Networkresourcescanbeautomaticallyreallocated
toendsystemsthat
havesuccessfullyperformedtheremediationsteps,withouttheinterventionofIToperations.
Deployment Models
ThefivekeyNACfunctionsdescribedabovedonotneedtobeimplementedconcurrentlyina
NACdeployment.Forexample,tosupportMACregistrationfor guests andotherusersonthe
network,thedetection,authentication,andauthorizationfunctionalitiescanbeimplemented
withouttheassessmentfunctionality.ThisallowsanITdepartmentto
gainvisibilityintowhois
usingwhichdevicesonthenetworkwhileallowingonlyvaliduserstoenterthenetwork.
Asanotherexample,theassessmentfunctionalitycanbeaddedtothedetection,authentication,
andauthorizationofendsystemswithouttheremediat ion functionality,allowingfortheauditing,
butnotquarantining,ofconnecting
endsystems.Thisprovidesvisibilityintothesecurityposture
andconfigurationofconnectingendsystemswithoutimpactingdevicenetworkconnectivity,and
canbeusedforauditingandsoftwareupdatepurposesbytheITdepartment.
ThefourNACdeploymentmodelsdescribedbelowbuildoneachotherbyimplementingsubsets
ofthe
fivekeyNACfunctions.EachmodelprovidesparticularaspectsofNACfunctionality,
supportingtherequirementsofdiverseenterpriseenvironments.Witheachsubsequentmodel,
theadditionalNACfunctionalitycanbeenabledwithouttheneedtoreplacepiecesofthe
EnterasysNACsolution.
Vista de página 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 97 98

Comentários a estes Manuais

Sem comentários