| Unregistered Policy | |
Inline NAC Design Procedures | ||
1. | Determine NAC Controller Location | |
2. | Determine the Number of NAC Controllers | |
3. | Identify Backend RADIUS Server Interaction | |
4. | Define Policy Configuration | |
| Failsafe Policy and Accept Policy Configuration | |
| Assessment Policy and Quarantine Policy Configuration | |
| Unregistered Policy | |
Additional Considerations | ||
NAC Deployment With an Intrusion Detection System (IDS) | ||
NAC Deployment With NetSight ASM |
Figures
Intelligent Wired Access Edge with Enterasys | ||
Intelligent Wired Access Edge with RFC 3580 Capable Devices | ||
Intelligent Wireless Access Edge - Thin APs with Wireless Switch | ||
Intelligent Wireless Access Edge - Intelligent AP (RFC 3580 Compliant | ||
VPN Remote Access | ||
Network with Intelligent Edge | ||
Network with | ||
Security Domain | ||
NAC Configuration | ||
NAC Configuration for a Security Domain | ||
MAC and User Override Configuration | ||
NAC Gateway Redundancy | ||
Policy Role Configuration in NetSight Policy Manager | ||
Service for the Assessing Role | ||
Service for the Quarantine Role | ||
Layer 2 NAC Controller Redundancy | ||
Layer 3 NAC Controller Redundancy |
Tables
Component Requirements for NAC Deployment Models | ||
Comparison of Appliance Functionality | ||
Comparison of Appliance Advantages and Disadvantages | ||
Component Requirements for Detection and Tracking | ||
Component Requirements for Authorization | ||
Component Requirements for Authorization with Assessment | ||
Component Requirements for Authorization with Assessment and Remediation | ||
Enterasys NAC Deployment Models | ||
Use Scenario Summaries | ||
Security Domain Configuration Guidelines | ||
Security Domain Configuration Guidelines for Assessment | ||
MAC Override Configuration Guidelines | ||
v