Enterasys-networks 9034385 Manual de usuario Pagina 27

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 98
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 26
Model 2: End-System Authorization
Enterasys NAC Design Guide 2-5
TheNACControllermayeitherdenytheendsystemaccesstothenetworkorassigntheend
systemtoaparticularsetofnetworkresourcesbyspecifyingaparticularpolicy.
Features and Value
InadditiontothefeaturesandvaluesfoundinModel1,thefollowingarekeypiecesof
functionalityandvaluepropositionssupportedbyModel2,EndSystemAuthorization:
Location-Based Authorization
Inadditiontoprovidingvisibilityintowho,what,when,andwheredevicesandusersare
connectingtothenetwork,thisdeploymentmodelallowsIToperationstocontrolaccessto
thenetworkwithdifferentlevelsofauthorizationbasedontheseparameters.Forlocation
basedauthorization,theEnterasysNACsolutioncanassigna
levelofaccesstoaconnecting
enduserordevicebasedonwhichareaofthenetworktheendsystemisconnected,through
theconfigurationofSecurityDomains.Forexample,whenanengineerconnectstothe
networkfromacontrolledareaofthenetworksuchasthelab,ora
facultymemberconnectsto
thenetworkfromaphysicallysecured facultyoffice,theengineerandfacultymemberare
appropriatelyauthorizedtoaccesssensitiveinformationresidingoninternalservers.
However,ifthesameusersconnecttothenetworkfromanunsecuredareaofthenetwork
suchastheopenwirelessLANavailable
intheenterpriseʹslobbyorcampus,orinastudent
dormitory,thentheseendsystemscanbeauthorizedwithadifferentlevelofnetworkaccess,
possiblyrestrictingcommunicationtotheinternalserversandotherresourcesonthenetwork.
Furthermore,theNACsolutioncanalsolockadevicetoa
specificswitchorswitchport,using
the“LockMAC”feature.Ifthedeviceismovedtoanyotherswitchportonthenetwork,it
willnotbeabletoconnect.Forexample,aprinteroraservercontainingsensitivedatamaybe
connectedtothenetworkataspecificlocation,such
asbehindafirewalloronaparticular
VLANforsecurityreasons.Physicallymovingtheconnectionofthesedevicestoanopenarea
ofthenetworkincreasestheriskofthesedevicesbeingattackedandcompromisedbecause
theywouldnolongerbeprotectedbythesecuritymechanismsthatwereput
inplaceonthe
network.The“LockMAC”featurecanbeusedtolimitthemobilityofspecificdevicesand
avoidmaliciousorunintentionalmisconfigurationsonthenetwork,therebyreducingrisk.
Device-Based Authorization
WiththisNACdeploymentmodel,endsystemsareauthorizedwithaccesstoaspecificsetof
networkresourcesbasedontheendsystemʹsMACaddress.Forinitialimplementation,the
EnterasysNACsolutionisconfiguredinamodewhereallMACaddressesofconnectingend
systemsarepermittedontothenetwork
anddynamicallylearned.TheEnterasysNAC
solutionisthenconfiguredtoallowonlyknownMACaddressesontothenetwork,assigning
eachendsystemaparticularauthorizationlevel.AnynewMACaddressconnectingtothe
networkisassignedadifferentauthorizationlevel,suchasdeniedaccess,restrictedaccess,or
allowedaccess
iftheuserisabletoproperlyregistertheirdevicetothenetwork.
TheEnterasysNACsolutionisabletoauthorizespecificdevicesorclassesofdevices(ba sed
onMACaddressOUIprefix)withaccesstoaspecificsetofnetworkresourcesthroughthe
configurationofMACoverrides.Forexample,an
endsystemthatisknowntobeinfected
withaworm,apubliclyaccessiblemachine,oramachinebelongingtoguestusermaybe
authorizedwitharestrictivesetofnetworkresourcesorcompletelydeniednetworkaccess,
regardlessofwhereandwhenthisdeviceconnects.Incontrast,anendsystembelonging
to
theIToperationsgroupmaybepermittedunrestrictedaccesstonetworkresourcesfor
infrastructuretroubleshootingandmaintenancepurposes,regardlessofwhereandwhenthe
deviceconnectstothenetwork.Ifyouaddlocationbasedauthorization(asdiscussedabove)
tothisexample,thenunrestrictedaccessforendsystemsbelongingto
theIToperationsgroup
Vista de pagina 26
1 2 ... 22 23 24 25 26 27 28 29 30 31 32 ... 97 98

Comentarios a estos manuales

Sin comentarios