Enterasys Networks 9034385 3 MAC Override Configuration Guidelines continued, Network Scenario

Models: 9034385

1 98
Download 98 pages 26.86 Kb
Page 79
Image 79
Table 5-3 MAC Override Configuration Guidelines (continued)

Procedures for Out-of-Band and Inline NAC

Table 5-3 MAC Override Configuration Guidelines (continued)

Network Scenario

Examples

Security Domain Configuration

 

 

 

A device or class of devices needs to be restricted network access (“blacklisted”) in a particular Security Domain or in all Security Domains.

Denying access or quarantining the MAC addresses of laptops used by guests or contractors in those areas of the network designated to provide access only to trusted employees.

In NAC Manager, create a MAC override with the following attributes:

Specify either full MAC address or MAC address OUI.

Select the Security Domain or all Security Domains for the MAC override scope.

For the assessment, authentication, and authorization configuration, choose a NAC Configuration or specify a custom configuration with the following parameters:

Select either the “Proxy RADIUS request to a RADIUS Server” radio button or the “Reject” radio button.

Check “Authorize MAC Authentication Requests Locally” so MAC authentication attempts by these devices are assigned the Accept Policy.

Check “Replace RADIUS Policy with Accept Policy” so the policy information returned from the RADIUS server will be overwritten by the Accept Policy.

Select “Quarantine” as the Accept Policy.

Deselect the “Enable Assessment” checkbox so the end-systems are not assessed for security posture compliance

Note that NetSight ASM leverages global ASM MAC overrides with this configuration to establish location-independent quarantine actions by quarantining end-systems that have violated the network security policy.

To deny untrusted end-systems network access by sending the switch a RADIUS Access-Reject message (instead of quarantining), make the following change to the authorization configuration for the MAC override:

Select the “Reject“ radio button instead of selecting the “Proxy RADIUS request to a RADIUS Server“ radio button.

Enterasys NAC Design Guide 5-15

Page 79
Image 79
Enterasys Networks 9034385 manual 3 MAC Override Configuration Guidelines continued, Network Scenario, Examples