Survey the Network
4-4 Design Planning
For
the
inline
implementation
of
the
Enterasys
NAC
solution,
the
NAC
Controller
authenticates
and
authorizes
end
‐
systems
locally
on
the
appliance,
and
does
not
rely
on
the
capabilities
of
downstream
infrastructure
devices.
Because
of
this,
the
NAC
Controller
can
be
utilized
in
networks
where
non
‐
intelligent
and/or
intelligent
infrastructure
devices
exist
at
the
edge
of
the
network.
If
the
network
does
not
have
an
intelligent
edge,
then
the
NAC
Controller
must
be
deployed
in
order
to
provide
the
authentication
and
authorization
capabilities
required
for
implementing
network
access
control,
as
shown
in
Figure 4
‐
2
.
Figure 4-2 Network with Non-Intelligent Edge
2. Evaluate Policy/VLAN and Authentication Configuration
For
a
network
with
an
intelligent
edge,
the
second
step
in
surveying
your
network
is
to
evaluate
the
network
authentication
method
currently
being
used,
and
how
the
deployment
of
Enterasys
NAC
will
affect
it.
A
network
with
an
intelligent
edge
can
be
classified
into
one
of
two
cases:
either
authentication
is
deployed
on
the
network
or
it
is
not.
Case #1: No authentication method is deployed on the network.
If
authentication
is
not
configured
on
the
network,
out
‐
of
‐
band
NAC
can
be
deployed
with
minimal
configuration
by
implementing
MAC
authentication
on
the
intelligent
edge
of
the
network
(if
the
edge
switches
support
MAC
authentication).
The
NAC
Gateway
can
be
configured
Note:
This step is not necessary if in step 1 you determined that the network does not have an
intelligent edge and the inline NAC Controller appliance will be deployed to provide the
authentication and policy enforcement capabilities.
Содержание 9034385
Страница 1: ...Enterasys Network Access Control Design Guide P N 9034385...
Страница 2: ......
Страница 4: ...ii...
Страница 8: ...vi...
Страница 22: ...Summary 1 12 Overview...
Страница 98: ...Additional Considerations 5 34 Design Procedures...