Enterasys-networks 9034385 Manual de usuario Pagina 33

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 98
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 32
Model 3: End-System Authorization with Assessment
Enterasys NAC Design Guide 2-11
•Applicationconfiguration
TheNACsolutioncandeterminewhichservicesandapplicationsareinstalledandenabledon
theendsystem.Certainapplicationsshouldberemovedfromthedevicepriortoestablishing
connectivitybecausetheymayhaveanegativeimpactontheoperationoftheendsystem,
distracttheenduserfrombusiness
functions,orbeusedtolaunchattacksonthenetwork.
Furthermore,particularservicesmaybeoutdatedandvulnerabletoattack.Theseservices
shouldeitherbeupdatedordisabledtominimizetherisktoconnectingendsystemsonthe
network.TheNACsolutionfacilitatesthisreconfigurationofapplicationsonanend system
priortonetworkconnection,toensuremaximumsecurityandproductivitywhenthede vice
connects.
Diverse Security Posture Compliance Verification
InorderforaNACsolutiontobeeffective,inclusionofallendsystemsinthenetwork
environmentmustbeaddressedwhendetecting,authenticating,assessing,andauthorizing
devices.TheEnterasysNACsolutionsupportsadiverseendsystemenvironment,and
providesintegratedsecurityandmanagementregardlessofwhattypeofdevicesare
connectedtothebusinessnetwork.
Enterasysleveragestwoassessmentmodels:agentbasedandagentless.Anagentbased
assessmentandanagentlessassessmentarebothcriticaltoensuringthatanyendsystemof
anytypecanbeincludedintheNACprocess.Thereareseveralreasonswhybothassessment
modelsarecriticaltoacompleteNACsolution.Securityagentsloadedontomanagedend
systemsofferextensiveassessmentcapabilities.Ifanagentisrequired,anewendsystem
connectingtothenetworkthathasnotdownloadedtheagentcanbequarantinedand
redirectedtoawebpage.Thewebpageprovides
informationonhowtheagentcanbe
downloadedandinstalledontheendsystemtobeginitsassessment.
However,therearetypesofendsystemsinatypicalnetworkthatmaynotbeabletoloada
softwareagent,suchasIPphones,securi tycameras,orprinters.Ifasecurity
agentisnot
availableforadevice(ortheoperatingsystemsrunningthedevice),anagentlessapproachis
theonlywaytoassesstheendsystem.Inaddition,considerendsystemsthatcouldnormally
holdanagent,butarenotunderthecontroloftheITorganization.Inthecase
ofguest
networkingthatprovidessupportforcontractors,vendors,andthepublic,thedesiremaybe
tosupportminimalorspecificnetworkservices,butstillensurethesafetyandsecurityofthe
networkandthepeopleusingit.Itisnotenoughtosimplyuseanetworkusagepolicyto
restricttheservicesaguestuserisallowedtoaccess.Becausetheguestisleveragingthesame
networkinfrastructureasthecriticalbusinessusers,itisimportantthatproactivesecurity
measuresareappliedtotheguestjustastheyaretoamanageduser.Thisisanothercase
whereanagent
lessapproachtoendsystemassessmentcanbecriticaltoensuringa
comprehensiveNACstrategy.
Boththeagentbasedandtheagentlessassessmentmodelscanbedeployedandintegrated
togetherintheEnterasysNACsolution.
Vista de pagina 32
1 2 ... 28 29 30 31 32 33 34 35 36 37 38 ... 97 98

Comentarios a estos manuales

Sin comentarios