Enterasys Networks 9034385 3 MAC Override Configuration Guidelines, Network Scenario, Examples

Models: 9034385

1 98
Download 98 pages 26.86 Kb
Page 78
Image 78
Table 5-3 MAC Override Configuration Guidelines

Procedures for Out-of-Band and Inline NAC

The following table describes scenarios where a MAC override may be configured for a particular end‐system.

Table 5-3 MAC Override Configuration Guidelines

Network Scenario

Examples

Security Domain Configuration

 

 

 

A device, or class of devices, that utilize a distinct set of parameters for authentication, assessment, and authorization.

Allocating VoIP services to IP phones on the network. For example, you could create a MAC override where a Polycom IP Phone, identified by the MAC address OUI of the authenticating end-system, is assigned to the IP Phone policy or Voice VLAN and not assessed for security posture compliance when connecting to any Security Domain.

In NAC Manager, create a MAC override with the following attributes:

Specify either full MAC address or MAC address OUI.

Select the Security Domain or all Security Domains for the MAC override scope.

For the assessment, authentication, and authorization configuration, choose a NAC Configuration or specify a custom configuration with the following parameters:

Select either the “Proxy RADIUS request to a RADIUS Server” radio button or the “Reject” radio button.

If the “Proxy RADIUS request to a RADIUS Server” radio button is selected, check “Authorize MAC Authentication Requests Locally” if MAC authentication requests are to be authorized, regardless of the MAC authentication password.

Check “Replace RADIUS Attributes with Accept Policy” if the policy information returned from the RADIUS server will be overwritten by the Accept Policy.

Format the Accept Policy with the policy or VLAN.

Check the “Enable Assessment” checkbox if this device, or class of devices, is to be assessed, and select the appropriate Assessment Configuration for these devices.

Specify the assessment and authorization parameters such as assessment interval, Quarantine Policy, and whether or not to apply the Assessment Policy while the end- system is being scanned.

5-14 Design Procedures

Page 78
Image 78
Enterasys Networks 9034385 manual 3 MAC Override Configuration Guidelines, Network Scenario, Examples