Survey the Network

If the network infrastructure does not contain intelligent devices at the edge or distribution layer, then inline NAC using the NAC Controller as the authorization point for connecting end‐systems must be implemented. This is not as secure as out‐of‐band NAC because the authorization point for end‐systems is located deeper into the network at the NAC Controller. With inline NAC, a quarantined end‐system, while restricted from network access to resources upstream from the NAC Controller, is still able to interact openly with resources and assets on the network downstream from the NAC Controller. However, an advantage of the NAC Controller is that it provides network access control without requiring the upgrade of the access layer or distribution layer of the network.

Furthermore, it is important to note that the NAC Controller and NAC Gateway can be deployed concurrently in the network for the simultaneous implementation of inline and out‐of‐band NAC, all centrally managed from the NetSight NAC Manager. The NAC Gateway can be utilized for areas of the network where intelligent switches reside, while the NAC Controller can be positioned inline for segments of the network where non‐intelligent devices exist.

If the deployment of out‐of‐band NAC is desired for a network with non‐intelligent access layer devices, the following options should be considered:

Distribution layer infrastructure devices can be strategically upgraded to Enterasys Matrix N‐ Series devices that are capable of individually authenticating and uniquely authorizing multiple devices connected to a single port. Most of the security benefits of out‐of‐band NAC using Enterasys policy can be obtained by implementing authorization at the distribution layer instead of at the port of connection in the access layer.

Access layer infrastructure devices can be upgraded to Enterasys policy‐capable switches or RFC 3580‐capable switches to obtain the security benefits of out‐of‐band NAC.

4.Identify Network Connection Methods

The previous steps have been concerned with implementing NAC for the internal LAN. In this step, various types of network connection methods are discussed, along with their impact on NAC deployment.

Wired LAN

Out‐of‐band or inline NAC can be implemented, depending on the capabilities of the access edge infrastructure devices.

Wireless LAN

Wireless LAN deployments may be categorized into either thick wireless deployments where access points (APs) operate independently on the network, or thin wireless deployments where APs communicate back to centrally deployed wireless switches that facilitate communication between APs.

Thick Wireless Deployments

Thick wireless deployments may consist of full‐featured APs that support authentication and authorization. Full‐featured thick APs fall into the intelligent edge category and have the same NAC implications as an intelligent wired edge. In this case, intelligent APs in a thick wireless deployment can be configured with out‐of‐band NAC using the NAC Gateway, with authentication and authorization implemented on the thick APs.

Other thick AP deployments may consist of APs that do not support authentication and/or authorization and merely act as a media converter between the wireless and wired networks. In

Enterasys NAC Design Guide 4-9

Page 61
Image 61
Enterasys Networks 9034385 manual Identify Network Connection Methods, Wired LAN, Wireless LAN, Thick Wireless Deployments

9034385 specifications

Enterasys Networks 9034385 is a powerful networking component designed to enhance enterprise-level connectivity and ensure robust network management capabilities. This device offers a wide range of features that cater to the demanding requirements of modern businesses, focusing on performance, reliability, and security.

One of the main features of the Enterasys Networks 9034385 is its advanced Layer 2 and Layer 3 switching capabilities, which enable efficient data processing and robust network performance. With support for various VLAN configurations, the device allows organizations to segment their networks effectively, leading to improved security and better traffic management.

Another critical aspect of the 9034385 is its support for high-speed connectivity. The device features multiple gigabit Ethernet ports, providing sufficient bandwidth for data-intensive applications commonly used in enterprise environments. The high-speed connections ensure that users can access applications and data quickly and reliably, minimizing latency issues that can affect productivity.

In terms of management, Enterasys Networks has equipped the 9034385 with advanced monitoring and diagnostic tools. These capabilities allow network administrators to track performance metrics, identify potential issues proactively, and make informed decisions about network resource allocation. The inclusion of SNMP (Simple Network Management Protocol) facilitates seamless integration with network management systems, providing comprehensive oversight of network health and performance.

Security is a paramount consideration for the 9034385, which incorporates advanced security protocols to protect sensitive data. Features such as port security, DHCP snooping, and dynamic ARP inspection help safeguard the network against unauthorized access and cyber threats. Furthermore, the device supports authentication mechanisms like 802.1X, ensuring that only authorized users and devices can connect to the network.

The Enterasys Networks 9034385 also stands out due to its seamless integration with cloud-based services and support for virtualization technologies. This compatibility enables organizations to adopt flexible architectures and manage their resources more efficiently. Additionally, the device is designed with scalability in mind, allowing businesses to expand their networks without significant hardware changes or disruptions.

Overall, the Enterasys Networks 9034385 is a versatile and powerful networking solution ideal for enterprises looking to enhance their network infrastructure while ensuring performance, security, and ease of management. The combination of advanced features and technologies makes it a valuable asset for businesses of all sizes striving for efficient and reliable connectivity.