Enterasys Networks 9034385 manual Use Scenarios, Design Planning, Design Procedures

Models: 9034385

1 98
Download 98 pages 26.86 Kb
Page 6
Image 6

Chapter 3: Use Scenarios

Scenario 1: Intelligent Wired Access Edge

3-1

Policy-Enabled Edge

3-2

RFC 3580 Capable Edge

3-3

Scenario 1 Implementation

3-4

Scenario 2: Intelligent Wireless Access Edge

3-5

Thin Wireless Edge

3-5

Thick Wireless Edge

3-7

Scenario 2 Implementation

3-8

Scenario 3: Non-intelligent Access Edge (Wired and Wireless)

3-9

Scenario 3 Implementation

3-11

Scenario 4: VPN Remote Access

3-11

Scenario 4 Implementation

3-12

Summary

3-13

Chapter 4: Design Planning

Identify the NAC Deployment Model

4-1

Survey the Network

4-2

1.

Identify the Intelligent Edge of the Network

4-2

2.

Evaluate Policy/VLAN and Authentication Configuration

4-4

 

Case #1: No authentication method is deployed on the network

4-4

 

Case #2: Authentication methods are deployed on the network

4-5

3.

Identify the Strategic Point for End-System Authorization

4-8

4.

Identify Network Connection Methods

4-9

 

Wired LAN

4-9

 

Wireless LAN

4-9

 

Remote Access WAN

4-10

 

Site-to-Site VPN

4-10

 

Remote Access VPN

4-11

Identify Inline or Out-of-band NAC Deployment

4-11

Summary

4-11

Chapter 5: Design Procedures

Procedures for Out-of-Band and Inline NAC

5-1

1.

Identify Required NetSight Applications

5-1

2.

Define Network Security Domains

5-2

 

NAC Configurations

5-3

3.

Identify Required MAC and User Overrides

5-12

 

MAC Overrides

5-12

 

User Overrides

5-16

Assessment Design Procedures

5-17

1.

Determine the Number of Assessment Servers

5-17

2.

Determine Assessment Server Location

5-18

3.

Identify Assessment Server Configuration

5-18

Out-of-Band NAC Design Procedures

5-19

1.

Identify Network Authentication Configuration

5-19

2.

Determine the Number of NAC Gateways

5-20

3.

Determine NAC Gateway Location

5-22

4.

Identify Backend RADIUS Server Interaction

5-23

5.

Determine End-System Mobility Restrictions

5-23

6.

VLAN Configuration

5-24

7.

Policy Role Configuration

5-24

8.

Define NAC Access Policies

5-24

 

Failsafe Policy and Accept Policy Configuration

5-25

 

Assessment Policy and Quarantine Policy Configuration

5-25

iv

Page 6
Image 6
Enterasys Networks 9034385 manual Use Scenarios, Design Planning, Design Procedures