Summary
4-12 Design Planning
server.
In
addition,
NAC
can
also
be
configured
to
locally
authorize
MAC
authentication
requests.
3.
Identify
the
strategic
point
in
the
network
where
end
‐
system
authorization
should
be
implemented.
The
most
secure
place
for
implementing
authorization
is
directly
at
the
point
of
connection
at
the
edge
of
the
network,
as
supported
by
Enterasys
policy
‐
capable
switches.
In
this
configuration,
the
implementation
of
out
‐
of
‐
band
NAC
using
the
NAC
Gateway
appliance
leverages
policy
on
Enterasys
switches
to
securely
authorize
connecting
end
‐
systems.
If
the
network
infrastructure
does
not
contain
intelligent
devices
at
the
edge
or
distribution
layer,
then
inline
NAC
using
the
NAC
Controller
as
the
authorization
point
for
connecting
end
‐
systems
must
be
implemented.
4.
Identify
the
network
connection
types
being
used.
The
previous
steps
have
been
concerned
with
implementing
NAC
for
the
internal
LAN.
In
this
step,
the
following
connection
types
are
discussed
along
with
their
impact
on
the
Enterasys
NAC
solution.
–
Wired
LAN
–
Wireless
LAN
–
Remote
Access
WAN
–
Site
‐
to
‐
Site
VPN
–
Remote
Access
VPN
Based
on
the
NAC
deployment
model
you
select,
and
the
results
of
your
network
infrastructure
evaluation,
you
will
be
able
to
identify
whether
out
‐
of
‐
band
NAC
or
inline
NAC
will
be
deployed
in
the
different
areas
of
your
network.
Summary of Contents for 9034385
Page 1: ...Enterasys Network Access Control Design Guide P N 9034385...
Page 2: ......
Page 4: ...ii...
Page 8: ...vi...
Page 22: ...Summary 1 12 Overview...
Page 98: ...Additional Considerations 5 34 Design Procedures...