Enterasys Networks 9034385 manual Deployment Models, Assessment, Authorization, Remediation

Page 12

NAC Solution Overview

Assessment

Determine if the device complies with corporate security and configuration requirements, such as operating system patch revision levels and antivirus signature definitions. Other security compliance requirements might include the physical location of the device and the time of day the connection attempt is made.

Authorization

Determine the appropriate network access for the connecting device based on the authentication and/or assessment results, and enforce this authorization level to the end‐system. The authorization level can be determined based on the deviceʹs location, MAC address, and security posture (as determined by the assessment results), in addition to the identity of the user/device validated through authentication.

The end‐system can be authorized for network access using different techniques, such as reconfiguring access edge switches or leveraging a specialized NAC appliance deployed in the transmission path of end‐system data traffic. Inline and out‐of‐band NAC implementations use different techniques for authorizing end‐systems on the network, each with unique advantages and disadvantages as discussed later in this chapter.

Remediation

Enable end users to safely remediate their non‐compliant end‐systems without impacting IT operations. With remediation, users can be notified when their system is quarantined for network security policy non‐compliance, and they can be directed to perform self‐service remediation techniques specific to the detected compliance violation. Notification methods include web redirection via a captive portal, email notification, pop‐up messages, and messenger service integration, among others.

The remediation process includes updating the device to meet corporate security requirements (for example, updating operating system patches and antivirus signatures) and reinitiating the network access process. Network resources can be automatically reallocated to end‐systems that have successfully performed the remediation steps, without the intervention of IT operations.

Deployment Models

The five key NAC functions described above do not need to be implemented concurrently in a NAC deployment. For example, to support MAC registration for guests and other users on the network, the detection, authentication, and authorization functionalities can be implemented without the assessment functionality. This allows an IT department to gain visibility into who is using which devices on the network while allowing only valid users to enter the network.

As another example, the assessment functionality can be added to the detection, authentication, and authorization of end‐systems without the remediation functionality, allowing for the auditing, but not quarantining, of connecting end‐systems. This provides visibility into the security posture and configuration of connecting end‐systems without impacting device network connectivity, and can be used for auditing and software update purposes by the IT department.

The four NAC deployment models described below build on each other by implementing subsets of the five key NAC functions. Each model provides particular aspects of NAC functionality, supporting the requirements of diverse enterprise environments. With each subsequent model, the additional NAC functionality can be enabled without the need to replace pieces of the Enterasys NAC solution.

1-2 Overview

Image 12
Contents Enterasys Page Page Page Contents Design Procedures Use ScenariosDesign Planning Figures TablesPage Intended Audience Related DocumentsGetting Help Support@enterasys.comNAC Solution Overview AuthenticationKey Functionality DetectionAuthorization Deployment ModelsAssessment RemediationModel 2 End-System Authorization Model 3 End-System Authorization with AssessmentModel 1 End-system Detection and Tracking NAC Solution Components NAC ApplianceNAC Gateway Appliance NAC Controller ApplianceNAC Controller is available in two models Appliance Comparison NAC Gateway NAC ControllerDisadvantage Advantage NetSight Management NetSight NAC ManagerSummary Radius ServerAssessment Server Summary Summary Overview Model 1 End-System Detection and Tracking ImplementationOut-of-Band NAC Features and Value Inline NAC LayerEnd-System and User Tracking Model 2 End-System Authorization Required and Optional ComponentsInline NAC Location-Based Authorization Device-Based AuthorizationUser-Based Authorization MAC RegistrationComponent Requirements for Authorization Model 3 End-System Authorization with Assessment Inline NAC Extensive Security Posture Compliance Verification Diverse Security Posture Compliance Verification Component Requirements for Authorization with Assessment Implementation Self-Service Remediation Required and Optional Components Enterasys NAC Deployment Models Value Scenario 1 Intelligent Wired Access Edge Use ScenariosPolicy-Enabled Edge NAC FunctionsRFC 3580 Capable Edge VLAN=ProductionScenario 1 Implementation Scenario 2 Intelligent Wireless Access Edge Thin Wireless EdgeRemediation Web User Laptop Thick Wireless Edge Scenario 2 Implementation Scenario 3 Non-intelligent Access Edge Wired and Wireless Layer 2 Wired LAN Scenario 4 VPN Remote Access Scenario 3 ImplementationVPN Remote Access Enterasys Scenario 4 ImplementationUse Scenario Summaries Summary and Appliance Requirements VPN remote access Design Planning Identify the NAC Deployment ModelSurvey the Network Identify the Intelligent Edge of the NetworkNetwork with Intelligent Edge Evaluate Policy/VLAN and Authentication Configuration Case #1 No authentication method is deployed on the networkCase #2 Authentication methods are deployed on the network Overview of Supported Authentication MethodsSupport of Multiple Authentication Methods End-System CapabilitiesSupport for Multiple End-System Connection Authentication Support on Enterasys Devices Authentication ConsiderationsIdentify the Strategic Point for End-System Authorization Wired LAN Wireless LANThick Wireless Deployments Identify Network Connection MethodsRemote Access WAN Thin Wireless DeploymentsSite-to-Site VPN Remote Access VPN Identify Inline or Out-of-band NAC DeploymentSummary Procedures for Out-of-Band and Inline NAC Identify Required NetSight ApplicationsDefine Network Security Domains NAC Configurations Security DomainNAC Configuration Authorization NAC Configuration for a Security Domain Procedures for Out-of-Band and Inline NAC To the network Procedures for Out-of-Band and Inline NAC Procedures for Out-of-Band and Inline NAC Security Domain Configuration Guidelines for Assessment Identify Required MAC and User Overrides MAC OverridesMAC and User Override Configuration Procedures for Out-of-Band and Inline NAC Procedures for Out-of-Band and Inline NAC User Overrides Assessment Design Procedures Determine the Number of Assessment ServersIdentify Assessment Server Configuration Determine Assessment Server LocationOut-of-Band NAC Design Procedures Identify Network Authentication ConfigurationDetermine the Number of NAC Gateways NAC Gateway Redundancy Determine NAC Gateway Location Identify Backend Radius Server Interaction Determine End-System Mobility RestrictionsVlan Configuration Policy Role ConfigurationDefine NAC Access Policies Failsafe Policy and Accept Policy Configuration Assessment Policy and Quarantine Policy ConfigurationPolicy Role Configuration in NetSight Policy Manager Assessment PolicyService for the Assessing Role Quarantine PolicyInline NAC Design Procedures Determine NAC Controller LocationUnregistered Policy Inline NAC Design Procedures Determine the Number of NAC Controllers Layer 2 NAC Controller Redundancy Define Policy Configuration Additional Considerations NAC Deployment With an Intrusion Detection System IDSNAC Deployment With NetSight ASM Additional Considerations Design Procedures