Enterasys-networks 9034385 Uživatelský manuál Strana 39

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 98
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 38
Enterasys NAC Design Guide 3-1
3
Use Scenarios
ThischapterdescribesfourNACusescenariosthatillustratehowthetypeofNACdeploymentis
directlydependentontheinfrastr ucturedevicesdeployedinthenetwork.Forsomenetwork
topologies,inlinenetworkaccesscontrolutilizingtheNACControllermayberequiredwhilefor
othernetworkconfigurations,theNACGatewayimplementingout
ofbandNACmaybeused.
TheEnterasysNACsolutioniscapableofimplementingnetworkaccesscontrolforallfouruse
scenariosaswellasenvironmentswithmixedusescenariosthatmayrequiretheconcurrent
deploymentoftheNACGatewayandtheNACController.Regardlessofthescenariothatis
deployed,
allNACGatewaysandNACControllersarecentrallymanagedbytheNetSightNAC
Managersoftwareapplication.
Fortheintelligentwiredaccessedgeandintelligentwirelessaccessedgeusescenarios,theterm
“intelligent”referstoanetworktopologywheretheaccessedgeiscomposedofEnterasyspolicy
enabledswitchescapableofsupporting
authenticationandpolicyenforcement,orthirdparty
switchescapableofsupportingauthenticationanddynamicVLANassignmentasdefinedinRFC
3580.
Scenario 1: Intelligent Wired Access Edge
Intheintelligentwiredaccessedgeusescenario,theedgeswitchesthatcomposethenetwork
accesslayerarecapableofprovidingauthentication(802.1X,webbased,orMAC)forconnecting
endsystems,andtheyarealsocapableofbeinganauthorizat ion pointfortheseendsystems
throughEnterasyspolicyand/ordynamicVLAN
assignmentasspecifiedinRFC3580.
Forthisusescenario,theNACGatewayapplianceisdeployedforoutofbandnetworkaccess
control,leveragingtheintelligentinfrastructuredevicesintheaccessedgeastheauthorization
pointforconnectingendsystems.
ItisimportanttonotethatEnterasyspolicyenabledswitchesprovide
increasedsecurityover
thirdpartyswitchesthatsupportRFC3580.Byusingportlevelgranulartrafficcontrol,users
quarantinedwithEnterasyspolicycanberestrictedfromcommunicatingwithotherquarantined
users,evenifcolocatedonthesameVLAN.InaQuarantineVLANasimplementedonthird
partyRFC3580
capableswitches,aquarantineduserposesathreattootherquarantinedusers
For information about... Refer to page...
Scenario 1: Intelligent Wired Access Edge 3-1
Scenario 2: Intelligent Wireless Access Edge 3-5
Scenario 3: Non-intelligent Access Edge (Wired and Wireless) 3-9
Scenario 4: VPN Remote Access 3-11
Summary 3-13
Zobrazit stránku 38
1 2 ... 34 35 36 37 38 39 40 41 42 43 44 ... 97 98

Komentáře k této Příručce

Žádné komentáře