Procedures for Out-of-Band and Inline NAC

The following table provides examples of various network scenarios that should be considered when identifying the number and configuration of Security Domains in your NAC deployment.

Table 5-1 Security Domain Configuration Guidelines

Network Scenario

 

Examples

Security Domain Configuration

 

 

 

 

Area of the network that is

Switches that provide access for

Proxy 802.1X and web-based authentication

configured to authenticate end-

 

trusted users authenticating to the

requests to a backend RADIUS server. This

systems with a secure

 

network using 802.1X or web-based

allows for the proper validation of end-system

authentication method, such as

 

authentication, such as LAN

login credentials for 802.1X and web-based

802.1X or web-based

 

segments and wireless networks

authentication methods.

authentication.

 

designated for trusted user access.

In NAC Manager, create a Security Domain with

 

 

 

 

VPN concentrator providing

the following configuration attributes:

 

 

connectivity to users implementing

• Select the “Proxy RADIUS Request to a

 

 

remote access VPN to connect into

 

 

RADIUS Server” radio button to allow the

 

 

the corporate LAN.

 

 

forwarding of RADIUS authentication

 

 

 

requests to a RADIUS server.

 

 

 

• If the RADIUS server returns a policy or VLAN

 

 

 

based on user or end-system identity,

 

 

 

uncheck “Replace RADIUS Attributes with

 

 

 

Accept Policy.” Otherwise, user overrides can

 

 

 

be configured to return a policy or VLAN

 

 

 

based on the user or end-system.

 

 

 

• Configure the Accept Policy with a policy or

 

 

 

VLAN that allows less restrictive network

 

 

 

access for trusted users.

 

 

 

 

Area of the network that is

Switches that provide access to

Locally authorize MAC authentication attempts.

configured to MAC authenticate

 

machine-centric end-systems, such

This enables the detection and authorization of

end-systems solely for the

 

as printers, IP phones, and IP

human-centric and machine-centric end-

purpose of end-system

 

cameras.

systems.

detection.

• Switches that provide access to

In NAC Manager, create a Security Domain with

 

 

 

human-centric end-systems that are

the following configuration attributes:

 

 

not authenticated in traditional

• With the “Proxy RADIUS Request to a

 

 

network environments, such as

 

 

RADIUS Server” radio button selected, check

 

 

untrusted users like guests and

 

 

the “Authorize MAC Authentication Requests

 

 

contractors.

 

 

Locally” option and specify a policy or VLAN

in the Accept Policy field.

• Configure the Accept Policy field with a policy or VLAN that provides more restrictive network access for end-systems authenticating with a less secure authentication method.

Enterasys NAC Design Guide 5-7

Page 71
Image 71
Enterasys Networks 9034385 manual Procedures for Out-of-Band and Inline NAC

9034385 specifications

Enterasys Networks 9034385 is a powerful networking component designed to enhance enterprise-level connectivity and ensure robust network management capabilities. This device offers a wide range of features that cater to the demanding requirements of modern businesses, focusing on performance, reliability, and security.

One of the main features of the Enterasys Networks 9034385 is its advanced Layer 2 and Layer 3 switching capabilities, which enable efficient data processing and robust network performance. With support for various VLAN configurations, the device allows organizations to segment their networks effectively, leading to improved security and better traffic management.

Another critical aspect of the 9034385 is its support for high-speed connectivity. The device features multiple gigabit Ethernet ports, providing sufficient bandwidth for data-intensive applications commonly used in enterprise environments. The high-speed connections ensure that users can access applications and data quickly and reliably, minimizing latency issues that can affect productivity.

In terms of management, Enterasys Networks has equipped the 9034385 with advanced monitoring and diagnostic tools. These capabilities allow network administrators to track performance metrics, identify potential issues proactively, and make informed decisions about network resource allocation. The inclusion of SNMP (Simple Network Management Protocol) facilitates seamless integration with network management systems, providing comprehensive oversight of network health and performance.

Security is a paramount consideration for the 9034385, which incorporates advanced security protocols to protect sensitive data. Features such as port security, DHCP snooping, and dynamic ARP inspection help safeguard the network against unauthorized access and cyber threats. Furthermore, the device supports authentication mechanisms like 802.1X, ensuring that only authorized users and devices can connect to the network.

The Enterasys Networks 9034385 also stands out due to its seamless integration with cloud-based services and support for virtualization technologies. This compatibility enables organizations to adopt flexible architectures and manage their resources more efficiently. Additionally, the device is designed with scalability in mind, allowing businesses to expand their networks without significant hardware changes or disruptions.

Overall, the Enterasys Networks 9034385 is a versatile and powerful networking solution ideal for enterprises looking to enhance their network infrastructure while ensuring performance, security, and ease of management. The combination of advanced features and technologies makes it a valuable asset for businesses of all sizes striving for efficient and reliable connectivity.