
Survey the Network
4-6 Design Planning
Similar
to
802.1X,
web
‐
based
authentication
requires
the
input
of
credentials
and
is
normally
used
on
user
‐
centric
end
‐
systems
that
have
a
concept
of
an
associated
user,
such
as
a
PC.
Therefore,
this
authentication
method
is
inappropriate
for
machine
‐
centric
devices
such
as
printers
and
IP
cameras.
Note
that
web
‐
based
authentication
is
a
user
‐
initiated
authentication
method
where
the
user
must
manually
begin
the
network
login
process
by
opening
a
web
browser
and
entering
credentials.
This
user
‐
initiated
method
prevents
seamless
network
connectivity
because
the
end
user
must
initiate
the
reauthentication
after
assessment
is
complete.
Since
Enterasys
NAC
only
acts
as
a
pass
‐
through
to
an
upstream
RADIUS
Server,
it
is
mandatory
that
a
full
authentication
deployment
is
configured
on
the
network
if
web
‐
based
authentication
is
used.
MAC
Authentication
MAC
authentication
authenticates
the
source
MAC
address
of
an
end
‐
system
and
grants
the
appropriate
level
of
access
by
validating
the
MAC
address
on
the
RADIUS
authentication
server.
This
authentication
method
only
requires
that
the
end
‐
system
generate
a
packet;
it
requires
no
special
software
on
the
end
‐
system.
Unlike
802.1X
and
web
‐
based
authentication,
MAC
authentication
can
be
used
to
authenticate
machine
‐
centric
end
‐
systems
that
have
no
concept
of
an
associated
user,
such
as
a
printer
or
IP
camera.
With
this
authentication
method,
Enterasys
NAC
can
act
as
a
pass
‐
through
to
an
upstream
RADIUS
Server
or
can
locally
authorize
MAC
authentication
attempts.
Therefore,
if
a
full
authentication
deployment
has
not
been
configured
on
the
network,
MAC
authentication
should
be
used.
End-System Capabilities
When
authentication
is
configured
on
the
network,
it
is
important
to
consider
end
‐
system
capabilities
and
their
ability
to
interact
with
the
authentication
process.
Machine
‐
centric
end
‐
systems
that
do
not
possess
an
802.1X
supplicant,
such
as
IP
cameras
and
printers,
may
only
be
capable
of
MAC
authenticating
to
the
network.
Some
human
‐
centric
end
‐
systems
such
as
PCs,
may
be
capable
of
802.1X
and
web
‐
based
authentication
while
other
PCs
not
installed
with
an
802.1X
supplicant,
are
only
capable
of
web
‐
based
authentication.
If
end
‐
systems
are
implementing
802.1X
and
web
‐
based
authentication,
Enterasys
NAC
should
leverage
these
authentication
methods
for
end
‐
system
detection.
For
end
‐
systems
not
implementing
802.1X
or
web
‐
based
authentication,
MAC
‐
based
authentication
can
be
enabled
on
these
switch
ports.
Support of Multiple Authentication Methods
In
order
to
support
an
enterprise
network
consisting
of
a
diverse
environment
of
machine
‐
centric
and
human
‐
centric
devices,
it
is
important
that
the
intelligent
edge
of
the
network
supports
the
concurrent
enabling
of
multiple
authentication
methods,
all
at
the
same
time
on
the
same
switch
port.
Some
intelligent
switches
may
not
support
the
enabling
of
multiple
authentication
methods
concurrently
on
a
single
port.
For
example,
MAC
and
802.1X
authentication
may
be
concurrently
enabled
on
a
port
to
account
for
the
fact
that
a
trusted
user,
guest
user,
or
IP
phone
may
connect
to
this
port.
The
ability
to
support
multiple
authentication
methods
concurrently
on
a
port
is
even
more
important
for
environments
where
mobility
of
devices
around
the
network
is
essential
for
ensuring
business
continuity.
Support for Multiple End-System Connection
It
is
important
to
know
whether
multiple
end
‐
system
connection
is
supported
by
the
intelligent
edge
of
the
network.
If
the
intelligent
edge
devices
only
support
the
authentication
of
one
end
‐
Содержание 9034385
Страница 1: ...Enterasys Network Access Control Design Guide P N 9034385...
Страница 2: ......
Страница 4: ...ii...
Страница 8: ...vi...
Страница 22: ...Summary 1 12 Overview...
Страница 98: ...Additional Considerations 5 34 Design Procedures...