Enterasys-networks 9034385 Manual de usuario

Busca en linea o descarga Manual de usuario para Herramientas Enterasys-networks 9034385. Enterasys Networks 9034385 User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 98
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - Enterasys

Enterasys®Network Access ControlDesign GuideP/N 9034385

Pagina 2

Getting Helpviii About This Guide•EnterasysNACManagerOnlineHelp.ExplainshowtouseNACManagertoconfigureyourNACappliances,andtoputinp

Pagina 3

Enterasys NAC Design Guide 1-11OverviewThischapterprovidesanoverviewoftheEnterasysNetworkAccessControl(NAC)solution,includingadescripti

Pagina 4

NAC Solution Overview1-2 OverviewAssessmentDetermineifthedevicecomplieswithcorporatesecurityandconfigurationrequirements,suchasoperating

Pagina 5 - Contents

NAC Solution OverviewEnterasys NAC Design Guide 1-3Model 1: End-system Detection and TrackingThisNACdeploymentmodelimplementsthedetectionpiece

Pagina 6 - Chapter 5: Design Procedures

NAC Solution Components1-4 OverviewNAC Solution ComponentsThissectiondiscussestherequiredandoptionalcomponentsoftheEnterasysNACsolution,b

Pagina 7

NAC Solution ComponentsEnterasys NAC Design Guide 1-5EnterasysofferstwotypesofNACappliances:theNACGatewayapplianceimplementsout‐of‐bandne

Pagina 8

NAC Solution Components1-6 Overviewofsupportingauthenticationand/orauthorization.TheNACControllerisalsorequiredinIPSecandSSLVPNdeploym

Pagina 9 - About This Guide

NAC Solution ComponentsEnterasys NAC Design Guide 1-7Appliance ComparisonThefollowingtablecompareshowthetwoNACappliancetypesimplementthefi

Pagina 10 - Getting Help

NAC Solution Components1-8 OverviewTable 1‐3outlinestheadvantagesanddisadvantagesofthetwoappliancetypesastheypertaintonetworksecurity,

Pagina 11 - Overview

NAC Solution ComponentsEnterasys NAC Design Guide 1-9NetSight ManagementTheNACappliancesareconfigured,monitored,andmanagedthroughmanagementa

Pagina 13 - NAC Solution Overview

Summary1-10 OverviewNetSight ConsoleNetSightConsoleisusedtomonitorthehealthandstatusofinfrastructuredevicesinthenetwork,includingswit

Pagina 14 - NAC Solution Components

SummaryEnterasys NAC Design Guide 1-11•Model3:End‐SystemAut horization withAssessment‐Implementsdetection,authentication,assessment,andaut

Pagina 16 - 1-6 Overview

Enterasys NAC Design Guide 2-12NAC Deployment ModelsThischapterdescribesthefourNACdeploymentmodelsandhowtheybuildoneachothertoprovide

Pagina 17 - Appliance Comparison

Model 1: End-System Detection and Tracking2-2 NAC Deployment ModelsRADIUSAccess‐AcceptorAccess‐RejectmessagereceivedfromtheupstreamRADIUSser

Pagina 18 - 1-8 Overview

Model 2: End-System AuthorizationEnterasys NAC Design Guide 2-3andinformationonthenetwork.EnterasysNACcanbeleveragedtoprovideinformationt

Pagina 19 - NetSight Management

Model 2: End-System Authorization2-4 NAC Deployment Modelsdeviceidentity,useridentity,and/orlocationinformationisusedtoauthorizetheconnect

Pagina 20 - Assessment Server

Model 2: End-System AuthorizationEnterasys NAC Design Guide 2-5TheNACControllermayeitherdenytheend‐systemaccesstothenetworkorassignthee

Pagina 21

Model 2: End-System Authorization2-6 NAC Deployment ModelsisonlyprovisionedbytheEnterasysNACsolutionwhenthedevicesconnecttoswitchesinth

Pagina 22 - 1-12 Overview

Model 2: End-System AuthorizationEnterasys NAC Design Guide 2-7apasswordintheregistrationwebpage.Thissponsorusernameandpasswordcanbevali

Pagina 23 - NAC Deployment Models

iNoticeEnterasys Networksreservestherighttomakechangesinspecificationsandotherinformationcontainedinthisdocumentanditswebsitewitho

Pagina 24 - Features and Value

Model 3: End-System Authorization with Assessment2-8 NAC Deployment ModelsARADIUSserverisonlyrequiredifout‐of‐bandnetworkaccesscontrolusing

Pagina 25

Model 3: End-System Authorization with AssessmentEnterasys NAC Design Guide 2-9serverisrunningoriftheHTTPserverisout‐of‐date)and client‐sid

Pagina 26 - Implementation

Model 3: End-System Authorization with Assessment2-10 NAC Deployment ModelsFeatures and ValueInadditiontothefeaturesandvaluesfoundinModel1a

Pagina 27

Model 3: End-System Authorization with AssessmentEnterasys NAC Design Guide 2-11•ApplicationconfigurationTheNACsolutioncandeterminewhichservice

Pagina 28 - MAC Registration

Model 4: End-System Authorization with Assessment and Remediation2-12 NAC Deployment ModelsRequired and Optional ComponentsThissectionsummarizesthe

Pagina 29

Model 4: End-System Authorization with Assessment and RemediationEnterasys NAC Design Guide 2-13Assistedremediationinformsenduserswhentheirend‐

Pagina 30

Model 4: End-System Authorization with Assessment and Remediation2-14 NAC Deployment ModelsInline NACForinlineEnterasysNACdeploymentsutilizingth

Pagina 31 - Inline NAC

Model 4: End-System Authorization with Assessment and RemediationEnterasys NAC Design Guide 2-15trafficwithspecificsourceanddestinationcharacter

Pagina 32

Summary2-16 NAC Deployment ModelsSummaryEnterasyssupportsallofthefivekeyNACfunctions:detection,authentication,assessment,authorization,an

Pagina 33

Enterasys NAC Design Guide 3-13Use ScenariosThischapterdescribesfourNACusescenariosthatillustratehowthetypeofNACdeploymentisdirectlyd

Pagina 35

Scenario 1: Intelligent Wired Access Edge3-2 Use ScenarioswithinthesameQuarantineVLANbecausetheauthorizationpointisusuallyimplementedatth

Pagina 36

Scenario 1: Intelligent Wired Access EdgeEnterasys NAC Design Guide 3-3RFC 3580 Capable EdgeInthisfiguretheNACGatewayandtheotherEnterasysNAC

Pagina 37

Scenario 1: Intelligent Wired Access Edge3-4 Use ScenariosScenario 1 ImplementationIntheintelligentwirededgeusescenario,thefiveNACfunctions

Pagina 38 - 2-16 NAC Deployment Models

Scenario 2: Intelligent Wireless Access EdgeEnterasys NAC Design Guide 3-5intelligentedgeonthenetwork.TheMatrixN‐seriesswitchiscapableofau

Pagina 39 - Use Scenarios

Scenario 2: Intelligent Wireless Access Edge3-6 Use ScenariosFigure 3-3 Intelligent Wireless Access Edge - Thin APs with Wireless Switch143 2Wireless

Pagina 40 - Policy-Enabled Edge

Scenario 2: Intelligent Wireless Access EdgeEnterasys NAC Design Guide 3-7Thick Wireless EdgeInathickwirelessdeployment,accesspointsforwardwir

Pagina 41 - RFC 3580 Capable Edge

Scenario 2: Intelligent Wireless Access Edge3-8 Use ScenariosScenario 2 ImplementationIntheintelligentwirelessaccessedgeusescenario,thefiveN

Pagina 42 - Scenario 1 Implementation

Scenario 3: Non-intelligent Access Edge (Wired and Wireless)Enterasys NAC Design Guide 3-9Itisimportanttonotethatifthewirelessedgeofthenet

Pagina 43 - Thin Wireless Edge

Scenario 3: Non-intelligent Access Edge (Wired and Wireless)3-10 Use ScenariosFigure 3-5 Non-intelligent Access Edge (Wired and Wireless)23334513Ente

Pagina 44 - 3-6 Use Scenarios

Scenario 4: VPN Remote AccessEnterasys NAC Design Guide 3-11Scenario 3 ImplementationInthenon‐intelligentaccessedgeusescenario,thefiveNACfun

Pagina 45 - Thick Wireless Edge

iiiContentsAbout This GuideIntended Audience ...

Pagina 46 - Scenario 2 Implementation

Scenario 4: VPN Remote Access3-12 Use ScenariosFigure 3-6 VPN Remote AccessScenario 4 ImplementationIntheVPNremoteaccessusescenario,thefiveN

Pagina 47

SummaryEnterasys NAC Design Guide 3-135.Remediation‐Whenthequarantinedenduseropensawebbrowsertoanywebsite,itstrafficisdynamicallyr

Pagina 48 - 3-10 Use Scenarios

Summary3-14 Use ScenariosScenario 4:VPN remote accessSummary:VPN concentrators act as a termination point for remote access VPN tunnels into the enter

Pagina 49 - Scenario 4: VPN Remote Access

Enterasys NAC Design Guide 4-14Design PlanningThischapterdescribesthestepsyoushouldtakeasyoubeginplanningyourNACdeployment.Thefirstst

Pagina 50 - Scenario 4 Implementation

Survey the Network4-2 Design Planningaccesstoawebbrowsertosafelyremediatetheirquarantinedend‐systemwithoutimpactingIToperations.Oncead

Pagina 51

Survey the NetworkEnterasys NAC Design Guide 4-3ThenetworkshowninFigure 4‐1below,illustratesthefollowingthreeexamplesofhowtheintelligent

Pagina 52 - 3-14 Use Scenarios

Survey the Network4-4 Design PlanningFortheinlineimplementationoftheEnterasysNACsolution,theNACControllerauthenticatesandauthorizesend‐

Pagina 53 - Design Planning

Survey the NetworkEnterasys NAC Design Guide 4-5tolocallyauthorizeallMACauthenticationrequestsforconnectingend‐systems,therebynotrequiring

Pagina 54 - Survey the Network

Survey the Network4-6 Design PlanningSimilarto802.1X,web‐basedauthenticationrequirestheinputofcredentialsandisnormallyusedonuser‐centri

Pagina 55

Survey the NetworkEnterasys NAC Design Guide 4-7systematatime, thenitissuggestedthatMAClocking(alsoknownasPortSecurity)beenabledont

Pagina 56 - 4-4 Design Planning

iv Chapter 3: Use ScenariosScenario 1: Intelligent Wired Access Edge ...

Pagina 57

Survey the Network4-8 Design PlanningauthenticatedtothenetworkandinteractwithEnterasysNACforauthentication,assessment,authorization,andr

Pagina 58 - End-System Capabilities

Survey the NetworkEnterasys NAC Design Guide 4-9Ifthenetworkinfrastructuredoesnotcontainintelligentdevicesattheedgeordistributionlayer,

Pagina 59 - Authentication Considerations

Survey the Network4-10 Design Planningthiscase,thethickAPdeploymentfallsintothecategoryofnon‐intelligentedgedeviceswiththesameNACimp

Pagina 60 - 4-8 Design Planning

Identify Inline or Out-of-band NAC DeploymentEnterasys NAC Design Guide 4-11Remote Access VPNInmanyenterpriseenvironments,aVPNconcentratorlocat

Pagina 61 - Wireless LAN

Summary4-12 Design Planningserver.Inaddition,NACcanalsobeconfiguredtolocallyauthorizeMACauthenticationrequests.3. Identifythestrategic

Pagina 62 - Site-to-Site VPN

Enterasys NAC Design Guide 5-15Design ProceduresThischapterdescribesthedesignproceduresforEnterasysNACdeploymentonanenterprisenetwork.Th

Pagina 63 - Remote Access VPN

Procedures for Out-of-Band and Inline NAC5-2 Design ProceduresPolicyManagerisnotrequiredforout‐of‐bandNACthatutilizesRFC3580‐compliantswit

Pagina 64 - 4-12 Design Planning

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-3Figure 5-1 Security DomainNAC ConfigurationsEachSecurityDomainhasadefault

Pagina 65 - Design Procedures

Procedures for Out-of-Band and Inline NAC5-4 Design ProceduresFigure 5-2 NAC ConfigurationAuthenticationTheAuthenticationsettingsdefinehowRADIUS

Pagina 66 - 5-2 Design Procedures

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-5•Howhealthresultsareprocessed.Whenanassessmentisperformedonanend‐sys

Pagina 67 - NAC Configurations

vUnregistered Policy ... 5-28In

Pagina 68 - Assessment

Procedures for Out-of-Band and Inline NAC5-6 Design ProceduresThefollowingfigureshowstheNACManagerwindowusedtocreateoreditaNACConfigura

Pagina 69 - Authorization

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-7Thefollowingtableprovidesexamplesofvariousnetworkscenariosthatshould

Pagina 70 - 5-6 Design Procedures

Procedures for Out-of-Band and Inline NAC5-8 Design ProceduresArea of the network that provides access to a group of users or devices that pose a pote

Pagina 71

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-9Area of the network that is configured to allow access only to specific end-sys

Pagina 72 - 5-8 Design Procedures

Procedures for Out-of-Band and Inline NAC5-10 Design ProceduresThefollowingtableprovidesnetworkscenariosfromanassessmentstandpointthatshoul

Pagina 73

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-11Area of the network, or a group of end-systems or users, that require assessme

Pagina 74 - 5-10 Design Procedures

Procedures for Out-of-Band and Inline NAC5-12 Design Procedures3. Identify Required MAC and User OverridesMACanduseroverridesareusedtohandleen

Pagina 75

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-13ThefollowingfiguredisplaysthewindowsusedforMACanduseroverrideconfi

Pagina 76 - MAC Overrides

Procedures for Out-of-Band and Inline NAC5-14 Design ProceduresThefollowingtabledescribesscenarioswhereaMACoverridemaybeconfiguredforapa

Pagina 77

Procedures for Out-of-Band and Inline NACEnterasys NAC Design Guide 5-15A device or class of devices needs to be restricted network access (“blacklist

Pagina 79

Procedures for Out-of-Band and Inline NAC5-16 Design ProceduresUser OverridesAuseroverrideletsyoucreateaconfigurationforaspecificenduser,

Pagina 80 - User Overrides

Assessment Design ProceduresEnterasys NAC Design Guide 5-17Managerwillnotmatchthisend‐systemandtheend‐systemisassignedtheSecurityDomain’s

Pagina 81 - Assessment Design Procedures

Assessment Design Procedures5-18 Design Procedures2. Determine Assessment Server LocationWhendeterminingthelocationoftheassessmentserversonth

Pagina 82 - 5-18 Design Procedures

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-19configurationifthesecurityvulnerabilityisconsideredariskfortheorganization.

Pagina 83

Out-of-Band NAC Design Procedures5-20 Design Procedures2. Determine the Number of NAC GatewaysThenumberofNACGatewaystobedeployedonthenetwork

Pagina 84 - 5-20 Design Procedures

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-21Figure 5-5 NAC Gateway RedundancyItisimportantthatthesecondaryNACGatewaydoes

Pagina 85

Out-of-Band NAC Design Procedures5-22 Design ProceduresprimaryNACGateway,thetransitiontothesecondaryNACGatewaywillnotexceedmaximumcapaci

Pagina 86 - 5-22 Design Procedures

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-23Itisimportanttonotethatonly theNACGatewaysthatareconfiguredwithremediati

Pagina 87

Out-of-Band NAC Design Procedures5-24 Design Procedures6. VLAN ConfigurationThisstepisforNACdeploymentsthatuseRFC‐3580‐compliantswitchesint

Pagina 88 - 8. Define NAC Access Policies

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-25previouslyspecifiedintheNACconfigurationmustbedefinedinNetSightPolicyManag

Pagina 89

Enterasys NAC Design Guide viiAbout This GuideTheNACDesignGuidedescribesthetechnicalconsiderationsfortheplanninganddesignoftheEnterasys

Pagina 90 - Assessment Policy

Out-of-Band NAC Design Procedures5-26 Design ProceduresFigure 5-6 Policy Role Configuration in NetSight Policy ManagerAssessment PolicyTheAssessment

Pagina 91 - Quarantine Policy

Out-of-Band NAC Design ProceduresEnterasys NAC Design Guide 5-27Figure 5-7 Service for the Assessing RoleNotethatitisnotmandatorytoassignthe

Pagina 92 - Inline NAC Design Procedures

Inline NAC Design Procedures5-28 Design ProceduresFigure 5-8 Service for the Quarantine RoleFurthermore,theQuarantinePolicyandothernetworkinfr

Pagina 93

Inline NAC Design ProceduresEnterasys NAC Design Guide 5-29However,theclosertheNACControllerisplacedtotheedgeofthenetwork,themoreNACC

Pagina 94 - 2S4082-25-SYS Up to 2000

Inline NAC Design Procedures5-30 Design Procedures2. Determine the Number of NAC ControllersThenumberofNACControllerstobedeployedonthenetwor

Pagina 95

Inline NAC Design ProceduresEnterasys NAC Design Guide 5-31Figure 5-9 Layer 2 NAC Controller RedundancyForaLayer3NACController,redundancyisac

Pagina 96 - 5-32 Design Procedures

Inline NAC Design Procedures5-32 Design Procedures3. Identify Backend RADIUS Server InteractionLayer2NACControllersdetectdownstreamend‐systemsv

Pagina 97 - Additional Considerations

Additional ConsiderationsEnterasys NAC Design Guide 5-33assessmentserverstoreachtheend‐systemwhileitisbeingassessed,regardlessofwhethert

Pagina 98 - 5-34 Design Procedures

Additional Considerations5-34 Design Procedures

Comentarios a estos manuales

Sin comentarios