Enterasys-networks 9034385 Manual de usuario Pagina 12

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 98
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 11
NAC Solution Overview
1-2 Overview
Assessment
Determineifthedevicecomplieswithcorporatesecurityandconfigurationrequirements,suchas
operatingsystempatchrevisionlevelsandantivirussignaturedefinitions.Othersecurity
compliancerequirementsmightincludethephysicallocationofthedeviceandthetimeofdaythe
connectionattemptismade.
Authorization
Determinetheappropriatenetworkaccessfortheconnectingdevicebasedontheauthentication
and/orassessmentresults,andenforcethisauthorizationleveltotheendsystem.The
authorizationlevelcanbedeterminedbasedonthedeviceʹslocation,MACaddress,andsecurity
posture(asdeterminedbytheassessmentresults),inadditionto
theidentityoftheuser/device
validatedthroughauthentication.
Theendsystemcanbeauthorizedfornetworkaccessusingdifferenttechniques,suchas
reconfiguringaccessedgeswitchesorleveragingaspecializedNACappliancedeployedinthe
transmissionpathofendsystemdatatraffic.InlineandoutofbandNACimplementationsuse
differenttechniquesforauthorizingendsystemsonthenetwork,eachwithuniqueadvantages
anddisadvantagesasdiscussedlaterinthischapter.
Remediation
EnableenduserstosafelyremediatetheirnoncompliantendsystemswithoutimpactingIT
operations.Withremediation,userscanbenotifiedwhentheirsystemisquarantinedfornetwork
securitypolicynoncompliance,andtheycanbedirectedtoperformselfserviceremediation
techniquesspecifictothe detectedcomplianceviolation.Notificationmethods
includeweb
redirectionviaacaptiveportal,emailnotification,popupmessages,andmessengerservice
integration,amongothers.
Theremediationprocessincludesupdatingthedevicetomeetcorporatesecurityrequirements
(forexample,updatingoperatingsystempatchesandantivirussignatures)and reinitiatingthe
networkaccessprocess.Networkresourcescanbeautomaticallyreallocated
toendsystemsthat
havesuccessfullyperformedtheremediationsteps,withouttheinterventionofIToperations.
Deployment Models
ThefivekeyNACfunctionsdescribedabovedonotneedtobeimplementedconcurrentlyina
NACdeployment.Forexample,tosupportMACregistrationfor guests andotherusersonthe
network,thedetection,authentication,andauthorizationfunctionalitiescanbeimplemented
withouttheassessmentfunctionality.ThisallowsanITdepartmentto
gainvisibilityintowhois
usingwhichdevicesonthenetworkwhileallowingonlyvaliduserstoenterthenetwork.
Asanotherexample,theassessmentfunctionalitycanbeaddedtothedetection,authentication,
andauthorizationofendsystemswithouttheremediat ion functionality,allowingfortheauditing,
butnotquarantining,ofconnecting
endsystems.Thisprovidesvisibilityintothesecurityposture
andconfigurationofconnectingendsystemswithoutimpactingdevicenetworkconnectivity,and
canbeusedforauditingandsoftwareupdatepurposesbytheITdepartment.
ThefourNACdeploymentmodelsdescribedbelowbuildoneachotherbyimplementingsubsets
ofthe
fivekeyNACfunctions.EachmodelprovidesparticularaspectsofNACfunctionality,
supportingtherequirementsofdiverseenterpriseenvironments.Witheachsubsequentmodel,
theadditionalNACfunctionalitycanbeenabledwithouttheneedtoreplacepiecesofthe
EnterasysNACsolution.
Vista de pagina 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 97 98

Comentarios a estos manuales

Sin comentarios