Enterasys Networks 9034385 manual Evaluate Policy/VLAN and Authentication Configuration

Models: 9034385

1 98
Download 98 pages 26.86 Kb
Page 56
Image 56
Figure 4-2 Network with Non-Intelligent Edge

Survey the Network

For the inline implementation of the Enterasys NAC solution, the NAC Controller authenticates and authorizes end‐systems locally on the appliance, and does not rely on the capabilities of downstream infrastructure devices. Because of this, the NAC Controller can be utilized in networks where non‐intelligent and/or intelligent infrastructure devices exist at the edge of the network. If the network does not have an intelligent edge, then the NAC Controller must be deployed in order to provide the authentication and authorization capabilities required for implementing network access control, as shown in Figure 4‐2.

Figure 4-2 Network with Non-Intelligent Edge

2. Evaluate Policy/VLAN and Authentication Configuration

Note: This step is not necessary if in step 1 you determined that the network does not have an intelligent edge and the inline NAC Controller appliance will be deployed to provide the authentication and policy enforcement capabilities.

For a network with an intelligent edge, the second step in surveying your network is to evaluate the network authentication method currently being used, and how the deployment of Enterasys NAC will affect it. A network with an intelligent edge can be classified into one of two cases: either authentication is deployed on the network or it is not.

Case #1: No authentication method is deployed on the network.

If authentication is not configured on the network, out‐of‐band NAC can be deployed with minimal configuration by implementing MAC authentication on the intelligent edge of the network (if the edge switches support MAC authentication). The NAC Gateway can be configured

4-4 Design Planning

Page 56
Image 56
Enterasys Networks 9034385 Evaluate Policy/VLAN and Authentication Configuration, 2 Network with Non-Intelligent Edge