Enterasys Networks 9034385 manual Inline NAC Design Procedures, Determine NAC Controller Location

Models: 9034385

1 98
Download 98 pages 26.86 Kb
Page 92
Image 92
Figure 5-8 Service for the Quarantine Role

Inline NAC Design Procedures

Figure 5-8 Service for the Quarantine Role

Furthermore, the Quarantine Policy and other network infrastructure devices must be configured to implement HTTP traffic redirection for quarantined end‐systems to return web notification of the quarantined state of an end‐system.

Unregistered Policy

If MAC (network) registration is configured in the NAC deployment, an “Unregistered” policy can be assigned to connecting end‐systems while they are unregistered on the network. This policy must be configured to allow basic services such as ARP, DNS, DHCP, and to implement HTTP traffic redirection to return web‐based notification for unregistered end‐systems. (Because this configuration is similar to the Quarantine Policy and the Assessment Policy, those policies could be assigned to unregistered end‐systems, if desired).

Inline NAC Design Procedures

The following section continues the Enterasys NAC design procedure with steps specifically relating to the implementation of inline NAC with the NAC Controller.

1. Determine NAC Controller Location

Because the NAC Controller is placed inline with traffic sourced from connecting end‐systems, the location of NAC Controllers is directly dependent on the network topology. NAC Controllers are typically placed between the edge where end‐systems connect to the network (for example, the wired and wireless access edge, or the remote access edge behind a VPN concentrator) and the networkʹs core and data center where mission critical infrastructure resources reside. This way, noncompliant end‐systems can be restricted from communicating to mission critical resources.

With the NAC Controller acting as the authorization point for traffic enforcement with inline NAC, there is a fundamental trade‐off when positioning the NAC Controller in the network topology: the closer the NAC Controller is placed to the edge of the network, the higher the level of security is achieved, in that end‐systems are authorized closer to the point of connection and end‐systems deemed noncompliant have access to a smaller set of network resources.

5-28 Design Procedures

Page 92
Image 92
Enterasys Networks 9034385 manual Inline NAC Design Procedures, Determine NAC Controller Location, Unregistered Policy