Enterasys-networks 9034385 Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Ferramentas Enterasys-networks 9034385. Enterasys Networks 9034385 User Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 98
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes

Resumo do Conteúdo

Página 1 - Enterasys

Enterasys®Network Access ControlDesign GuideP/N 9034385

Página 2

Getting Helpviii About This Guide•EnterasysNACManagerOnlineHelp.ExplainshowtouseNACManagertoconfigureyourNACappliances,andtoputinp

Página 3

Enterasys NAC Design Guide 1-11OverviewThischapterprovidesanoverviewoftheEnterasysNetworkAccessControl(NAC)solution,includingadescripti

Página 4

NAC Solution Overview1-2 OverviewAssessmentDetermineifthedevicecomplieswithcorporatesecurityandconfigurationrequirements,suchasoperating

Página 5 - Contents

NAC Solution OverviewEnterasys NAC Design Guide 1-3Model 1: End-system Detection and TrackingThisNACdeploymentmodelimplementsthedetectionpiece

Página 6 - Chapter 5: Design Procedures

NAC Solution Components1-4 OverviewNAC Solution ComponentsThissectiondiscussestherequiredandoptionalcomponentsoftheEnterasysNACsolution,b

Página 7

NAC Solution ComponentsEnterasys NAC Design Guide 1-5EnterasysofferstwotypesofNACappliances:theNACGatewayapplianceimplementsout‐of‐bandne

Página 8

NAC Solution Components1-6 Overviewofsupportingauthenticationand/orauthorization.TheNACControllerisalsorequiredinIPSecandSSLVPNdeploym

Página 9 - About This Guide

NAC Solution ComponentsEnterasys NAC Design Guide 1-7Appliance ComparisonThefollowingtablecompareshowthetwoNACappliancetypesimplementthefi

Página 10 - Getting Help

NAC Solution Components1-8 OverviewTable 1‐3outlinestheadvantagesanddisadvantagesofthetwoappliancetypesastheypertaintonetworksecurity,

Página 11 - Overview

NAC Solution ComponentsEnterasys NAC Design Guide 1-9NetSight ManagementTheNACappliancesareconfigured,monitored,andmanagedthroughmanagementa

Página 13 - NAC Solution Overview

Summary1-10 OverviewNetSight ConsoleNetSightConsoleisusedtomonitorthehealthandstatusofinfrastructuredevicesinthenetwork,includingswit

Página 14 - NAC Solution Components

SummaryEnterasys NAC Design Guide 1-11•Model3:End‐SystemAut horization withAssessment‐Implementsdetection,authentication,assessment,andaut

Página 16 - 1-6 Overview

Enterasys NAC Design Guide 2-12NAC Deployment ModelsThischapterdescribesthefourNACdeploymentmodelsandhowtheybuildoneachothertoprovide

Página 17 - Appliance Comparison

Model 1: End-System Detection and Tracking2-2 NAC Deployment ModelsRADIUSAccess‐AcceptorAccess‐RejectmessagereceivedfromtheupstreamRADIUSser

Página 18 - 1-8 Overview

Model 2: End-System AuthorizationEnterasys NAC Design Guide 2-3andinformationonthenetwork.EnterasysNACcanbeleveragedtoprovideinformationt

Página 19 - NetSight Management

Model 2: End-System Authorization2-4 NAC Deployment Modelsdeviceidentity,useridentity,and/orlocationinformationisusedtoauthorizetheconnect

Página 20 - Assessment Server

Model 2: End-System AuthorizationEnterasys NAC Design Guide 2-5TheNACControllermayeitherdenytheend‐systemaccesstothenetworkorassignthee

Página 21

Model 2: End-System Authorization2-6 NAC Deployment ModelsisonlyprovisionedbytheEnterasysNACsolutionwhenthedevicesconnecttoswitchesinth

Página 22 - 1-12 Overview

Model 2: End-System AuthorizationEnterasys NAC Design Guide 2-7apasswordintheregistrationwebpage.Thissponsorusernameandpasswordcanbevali

Página 23 - NAC Deployment Models

iNoticeEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthisdocumentanditswebsitewitho

Página 24 - Features and Value

Model 3: End-System Authorization with Assessment2-8 NAC Deployment ModelsARADIUSserverisonlyrequiredifout‐of‐bandnetworkaccesscontrolusing

Página 25

Model 3: End-System Authorization with AssessmentEnterasys NAC Design Guide 2-9serverisrunningoriftheHTTPserverisout‐of‐date)and client‐sid

Página 26 - Implementation

Model 3: End-System Authorization with Assessment2-10 NAC Deployment ModelsFeatures and ValueInadditiontothefeaturesandvaluesfoundinModel1a

Página 27

Model 3: End-System Authorization with AssessmentEnterasys NAC Design Guide 2-11•ApplicationconfigurationTheNACsolutioncandeterminewhichservice

Página 28 - MAC Registration

Model 4: End-System Authorization with Assessment and Remediation2-12 NAC Deployment ModelsRequired and Optional ComponentsThissectionsummarizesthe

Página 29

Model 4: End-System Authorization with Assessment and RemediationEnterasys NAC Design Guide 2-13Assistedremediationinformsenduserswhentheirend‐

Página 30

Model 4: End-System Authorization with Assessment and Remediation2-14 NAC Deployment ModelsInline NACForinlineEnterasysNACdeploymentsutilizingth

Página 31 - Inline NAC

Model 4: End-System Authorization with Assessment and RemediationEnterasys NAC Design Guide 2-15trafficwithspecificsourceanddestinationcharacter

Página 32

Summary2-16 NAC Deployment ModelsSummaryEnterasyssupportsallofthefivekeyNACfunctions:detection,authentication,assessment,authorization,an

Página 33

Enterasys NAC Design Guide 3-13Use ScenariosThischapterdescribesfourNACusescenariosthatillustratehowthetypeofNACdeploymentisdirectlyd

Página 35

Scenario 1: Intelligent Wired Access Edge3-2 Use ScenarioswithinthesameQuarantineVLANbecausetheauthorizationpointisusuallyimplementedatth

Página 36

Scenario 1: Intelligent Wired Access EdgeEnterasys NAC Design Guide 3-3RFC 3580 Capable EdgeInthisfiguretheNACGatewayandtheotherEnterasysNAC

Página 37

Scenario 1: Intelligent Wired Access Edge3-4 Use ScenariosScenario 1 ImplementationIntheintelligentwirededgeusescenario,thefiveNACfunctions

Página 38 - 2-16 NAC Deployment Models

Scenario 2: Intelligent Wireless Access EdgeEnterasys NAC Design Guide 3-5intelligentedgeonthenetwork.TheMatrixN‐seriesswitchiscapableofau

Página 39 - Use Scenarios

Scenario 2: Intelligent Wireless Access Edge3-6 Use ScenariosFigure 3-3 Intelligent Wireless Access Edge - Thin APs with Wireless Switch143 2Wireless

Página 40 - Policy-Enabled Edge

Scenario 2: Intelligent Wireless Access EdgeEnterasys NAC Design Guide 3-7Thick Wireless EdgeInathickwirelessdeployment,accesspointsforwardwir

Página 41 - RFC 3580 Capable Edge

Scenario 2: Intelligent Wireless Access Edge3-8 Use ScenariosScenario 2 ImplementationIntheintelligentwirelessaccessedgeusescenario,thefiveN

Página 42 - Scenario 1 Implementation

Scenario 3: Non-intelligent Access Edge (Wired and Wireless)Enterasys NAC Design Guide 3-9Itisimportanttonotethatifthewirelessedgeofthenet

Página 43 - Thin Wireless Edge

Scenario 3: Non-intelligent Access Edge (Wired and Wireless)3-10 Use ScenariosFigure 3-5 Non-intelligent Access Edge (Wired and Wireless)23334513Ente

Página 44 - 3-6 Use Scenarios

Scenario 4: VPN Remote AccessEnterasys NAC Design Guide 3-11Scenario 3 ImplementationInthenon‐intelligentaccessedgeusescenario,thefiveNACfun

Página 45 - Thick Wireless Edge

iiiContentsAbout This GuideIntended Audience ...

Página 46 - Scenario 2 Implementation

Scenario 4: VPN Remote Access3-12 Use ScenariosFigure 3-6 VPN Remote AccessScenario 4 ImplementationIntheVPNremoteaccessusescenario,thefiveN

Página 47

SummaryEnterasys NAC Design Guide 3-135.Remediation‐Whenthequarantinedenduseropensawebbrowsertoanywebsite,itstrafficisdynamicallyr

Página 48 - 3-10 Use Scenarios

Summary3-14 Use ScenariosScenario 4:VPN remote accessSummary:VPN concentrators act as a termination point for remote access VPN tunnels into the enter

Página 49 - Scenario 4: VPN Remote Access

Enterasys NAC Design Guide 4-14Design PlanningThischapterdescribesthestepsyoushouldtakeasyoubeginplanningyourNACdeployment.Thefirstst

Página 50 - Scenario 4 Implementation

Survey the Network4-2 Design Planningaccesstoawebbrowsertosafelyremediatetheirquarantinedend‐systemwithoutimpactingIToperations.Oncead

Página 51

Survey the NetworkEnterasys NAC Design Guide 4-3ThenetworkshowninFigure 4‐1below,illustratesthefollowingthreeexamplesofhowtheintelligent

Página 52 - 3-14 Use Scenarios

Survey the Network4-4 Design PlanningFortheinlineimplementationoftheEnterasysNACsolution,theNACControllerauthenticatesandauthorizesend‐

Página 53 - Design Planning

Survey the NetworkEnterasys NAC Design Guide 4-5tolocallyauthorizeallMACauthenticationrequestsforconnectingend‐systems,therebynotrequiring

Página 54 - Survey the Network

Survey the Network4-6 Design PlanningSimilarto802.1X,web‐basedauthenticationrequirestheinputofcredentialsandisnormallyusedonuser‐centri

Página 55

Survey the NetworkEnterasys NAC Design Guide 4-7systematatime, thenitissuggestedthatMAClocking(alsoknownasPortSecurity)beenabledont

Página 56 - 4-4 Design Planning

iv Chapter 3: Use ScenariosScenario 1: Intelligent Wired Access Edge ...

Página 57

Survey the Network4-8 Design PlanningauthenticatedtothenetworkandinteractwithEnterasysNACforauthentication,assessment,authorization,andr

Página 58 - End-System Capabilities

Survey the NetworkEnterasys NAC Design Guide 4-9Ifthenetworkinfrastructuredoesnotcontainintelligentdevicesattheedgeordistributionlayer,

Página 59 - Authentication Considerations

Survey the Network4-10 Design Planningthiscase,thethickAPdeploymentfallsintothecategoryofnon‐intelligentedgedeviceswiththesameNACimp

Página 60 - 4-8 Design Planning

Identify Inline or Out-of-band NAC DeploymentEnterasys NAC Design Guide 4-11Remote Access VPNInmanyenterpriseenvironments,aVPNconcentratorlocat

Página 61 - Wireless LAN

Summary4-12 Design Planningserver.Inaddition,NACcanalsobeconfiguredtolocallyauthorizeMACauthenticationrequests.3. Identifythestrategic

Página 62 - Site-to-Site VPN

Enterasys NAC Design Guide 5-15Design ProceduresThischapterdescribesthedesignproceduresforEnterasysNACdeploymentonanenterprisenetwork.Th

Página 63 - Remote Access VPN

Procedures for Out-of-Band and Inline NAC5-2 Design ProceduresPolicyManagerisnotrequiredforout‐of‐bandNACthatutilizesRFC3580‐compliantswit

Página 64 - 4-12 Design Planning

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-3Figure 5-1 Security DomainNAC ConfigurationsEachSecurityDomainhasadefault

Página 65 - Design Procedures

Procedures for Out-of-Band and Inline NAC5-4 Design ProceduresFigure 5-2 NAC ConfigurationAuthenticationTheAuthenticationsettingsdefinehowRADIUS

Página 66 - 5-2 Design Procedures

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-5•Howhealthresultsareprocessed.Whenanassessmentisperformedonanend‐sys

Página 67 - NAC Configurations

vUnregistered Policy ... 5-28In

Página 68 - Assessment

Procedures for Out-of-Band and Inline NAC5-6 Design ProceduresThefollowingfigureshowstheNACManagerwindowusedtocreateoreditaNACConfigura

Página 69 - Authorization

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-7Thefollowingtableprovidesexamplesofvariousnetworkscenariosthatshould

Página 70 - 5-6 Design Procedures

Procedures for Out-of-Band and Inline NAC5-8 Design ProceduresArea of the network that provides access to a group of users or devices that pose a pote

Página 71

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-9Area of the network that is configured to allow access only to specific end-sys

Página 72 - 5-8 Design Procedures

Procedures for Out-of-Band and Inline NAC5-10 Design ProceduresThefollowingtableprovidesnetworkscenariosfromanassessmentstandpointthatshoul

Página 73

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-11Area of the network, or a group of end-systems or users, that require assessme

Página 74 - 5-10 Design Procedures

Procedures for Out-of-Band and Inline NAC5-12 Design Procedures3. Identify Required MAC and User OverridesMACanduseroverridesareusedtohandleen

Página 75

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-13ThefollowingfiguredisplaysthewindowsusedforMACanduseroverrideconfi

Página 76 - MAC Overrides

Procedures for Out-of-Band and Inline NAC5-14 Design ProceduresThefollowingtabledescribesscenarioswhereaMACoverridemaybeconfiguredforapa

Página 77

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-15A device or class of devices needs to be restricted network access (“blacklist

Página 79

Procedures for Out-of-Band and Inline NAC5-16 Design ProceduresUser OverridesAuseroverrideletsyoucreateaconfigurationforaspecificenduser,

Página 80 - User Overrides

Assessment Design ProceduresEnterasys NAC Design Guide 5-17Managerwillnotmatchthisend‐systemandtheend‐systemisassignedtheSecurityDomain’s

Página 81 - Assessment Design Procedures

Assessment Design Procedures5-18 Design Procedures2. Determine Assessment Server LocationWhendeterminingthelocationoftheassessmentserversonth

Página 82 - 5-18 Design Procedures

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-19configurationifthesecurityvulnerabilityisconsideredariskfortheorganization.

Página 83

Out-of-Band NAC Design Procedures5-20 Design Procedures2. Determine the Number of NAC GatewaysThenumberofNACGatewaystobedeployedonthenetwork

Página 84 - 5-20 Design Procedures

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-21Figure 5-5 NAC Gateway RedundancyItisimportantthatthesecondaryNACGatewaydoes

Página 85

Out-of-Band NAC Design Procedures5-22 Design ProceduresprimaryNACGateway,thetransitiontothesecondaryNACGatewaywillnotexceedmaximumcapaci

Página 86 - 5-22 Design Procedures

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-23Itisimportanttonotethatonly theNACGatewaysthatareconfiguredwithremediati

Página 87

Out-of-Band NAC Design Procedures5-24 Design Procedures6. VLAN ConfigurationThisstepisforNACdeploymentsthatuseRFC‐3580‐compliantswitchesint

Página 88 - 8. Define NAC Access Policies

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-25previouslyspecifiedintheNACconfigurationmustbedefinedinNetSightPolicyManag

Página 89

Enterasys NAC Design Guide viiAbout This GuideTheNACDesignGuidedescribesthetechnicalconsiderationsfortheplanninganddesignoftheEnterasys

Página 90 - Assessment Policy

Out-of-Band NAC Design Procedures5-26 Design ProceduresFigure 5-6 Policy Role Configuration in NetSight Policy ManagerAssessment PolicyTheAssessment

Página 91 - Quarantine Policy

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-27Figure 5-7 Service for the Assessing RoleNotethatitisnotmandatorytoassignthe

Página 92 - Inline NAC Design Procedures

Inline NAC Design Procedures5-28 Design ProceduresFigure 5-8 Service for the Quarantine RoleFurthermore,theQuarantinePolicyandothernetworkinfr

Página 93

Inline NAC Design ProceduresEnterasys NAC Design Guide 5-29However,theclosertheNACControllerisplacedtotheedgeofthenetwork,themoreNACC

Página 94 - 2S4082-25-SYS Up to 2000

Inline NAC Design Procedures5-30 Design Procedures2. Determine the Number of NAC ControllersThenumberofNACControllerstobedeployedonthenetwor

Página 95

Inline NAC Design ProceduresEnterasys NAC Design Guide 5-31Figure 5-9 Layer 2 NAC Controller RedundancyForaLayer3NACController,redundancyisac

Página 96 - 5-32 Design Procedures

Inline NAC Design Procedures5-32 Design Procedures3. Identify Backend RADIUS Server InteractionLayer2NACControllersdetectdownstreamend‐systemsv

Página 97 - Additional Considerations

Additional ConsiderationsEnterasys NAC Design Guide 5-33assessmentserverstoreachtheend‐systemwhileitisbeingassessed,regardlessofwhethert

Página 98 - 5-34 Design Procedures

Additional Considerations5-34 Design Procedures

Comentários a estes Manuais

Sem comentários