Enterasys Networks 9034385 User Overrides, 3 MAC Override Configuration Guidelines continued

Models: 9034385

1 98
Download 98 pages 26.86 Kb
Page 80
Image 80
User Overrides

Procedures for Out-of-Band and Inline NAC

Table 5-3 MAC Override Configuration Guidelines (continued)

Network Scenario

Examples

Security Domain Configuration

 

 

 

A device, or class of devices, needs to be permitted a special level of network access (“whitelisted”) in a particular Security Domain or in all Security Domains.

Permitting an unrestricted level of access for end-systems that belong to IT operations.

In NAC Manager, create a MAC override with the following attributes:

Specify either full MAC address or MAC address OUI.

Select the Security Domain or all Security Domains for the MAC override scope.

For the assessment, authentication, and authorization configuration, choose a NAC Configuration or specify a custom configuration with the following parameters:

Select the “Proxy RADIUS request to a RADIUS Server“ radio button.

Check “Authorize MAC Authentication Requests Locally“ so MAC authentication attempts by these devices are assigned the Accept Policy.

Check “Replace RADIUS Attributes with Accept Policy“ so the policy information returned from the RADIUS server will be overwritten by the Accept Policy.

Specify “Administrator“ as the Accept Policy to allow unlimited access for these devices.

Uncheck the “Enable Assessment“ checkbox so these devices are not assessed for security posture compliance.

User Overrides

A user override lets you create a configuration for a specific end user, based on the user name. For example, you could create a user override that gives a trusted end user immediate network access without performing an assessment.

User overrides can be used in network scenarios similar to those described for MAC overrides:

A specific user that requires a distinct set of parameters for authentication, assessment, and authorization. For example, a user override can be configured for executives of a corporation to permit immediate network access without assigning the Assessment Policy during end‐ system assessment.

A specific user can be restricted network access (“blacklisted”) for a particular Security Domain or all Security Domains, by associating the username with the Accept Policy of “Quarantine” or by sending a RADIUS Access‐Reject for this user. For example, an employee can be restricted access to a certain area of the network, or students can be denied network access during an exam.

A specific user can be permitted a special level of network access (“whitelisted”) by associating the username with the Accept Policy of “Administrator” to allow unlimited network access.

It is important to note that the Layer 3 NAC Controller may not determine the true MAC address of the downstream connected end‐system. In this case, a MAC override configured in NAC

5-16 Design Procedures

Page 80
Image 80
Enterasys Networks 9034385 User Overrides, 3 MAC Override Configuration Guidelines continued, Network Scenario, Examples