Enterasys Networks 9034385 Scenario 4 Implementation, 6 VPN Remote Access, NAC Manager, Enterasys

Models: 9034385

1 98
Download 98 pages 26.86 Kb
Page 50
Image 50
Figure 3-6 VPN Remote Access

Scenario 4: VPN Remote Access

Figure 3-6 VPN Remote Access

 

Enterasys

NAC Functions

NAC Manager

 

 

 

 

 

1

Detect

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2

Authenticate

Remediation

 

 

 

 

3

Assess

 

 

 

 

 

 

 

 

4

Authorize

Web Page

 

 

 

 

 

5

Remediate

Role=Quarantine NAC

4 Controller

(inline appliance)

1

5

3

3

3

VPN Concentrator

Assessment

Server

Scenario 4 Implementation

In the VPN remote access use scenario, the five NAC functions are implemented in the following manner with the deployment of the NAC Controller for inline network access control.

1.Detection ‐ The userʹs end‐system successfully establishes a VPN tunnel with the VPN concentrator, and the VPN concentrator transmits unencrypted data traffic onto the network that traverses the NAC Controller. This traffic is sourced from an IP address not previously seen by the controller.

2.Authentication ‐ Authentication is most likely disabled altogether on the NAC Controller, trusting that the downstream VPN concentrator authenticated the connecting user.

3.Assessment ‐ The NAC Controller requests an assessment of the end‐system according to predefined security policy parameters. The assessment can be agent‐based or agent‐less, and is executed locally by the NAC Controllerʹs assessment functionality and/or remotely by a pool of assessment servers.

4.Authorization ‐ Once authentication and assessment are complete, the NAC Controller allocates the appropriate network resources to the end‐system based on authentication and/or assessment results. This is implemented locally on the NAC Controller by assigning a policy to traffic sourced from the end‐system. If authentication fails and/or the assessment results indicate a noncompliant end‐system, the NAC Controller can either deny the end‐system access to the network, or quarantine the end‐system by assigning a particular policy on the controller.

3-12 Use Scenarios

Page 50
Image 50
Enterasys Networks 9034385 Scenario 4 Implementation, 6 VPN Remote Access, NAC Manager, Controller, Enterasys, Detect