Inline NAC Design Procedures
5-28 Design Procedures
Figure 5-8 Service for the Quarantine Role
Furthermore,
the
Quarantine
Policy
and
other
network
infrastructure
devices
must
be
configured
to
implement
HTTP
traffic
redirection
for
quarantined
end
‐
systems
to
return
web
notification
of
the
quarantined
state
of
an
end
‐
system.
Unregistered Policy
If
MAC
(network)
registration
is
configured
in
the
NAC
deployment,
an
“Unregistered”
policy
can
be
assigned
to
connecting
end
‐
systems
while
they
are
unregistered
on
the
network.
This
policy
must
be
configured
to
allow
basic
services
such
as
ARP,
DNS,
DHCP,
and
to
implement
HTTP
traffic
redirection
to
return
web
‐
based
notification
for
unregistered
end
‐
systems.
(Because
this
configuration
is
similar
to
the
Quarantine
Policy
and
the
Assessment
Policy,
those
policies
could
be
assigned
to
unregistered
end
‐
systems,
if
desired).
Inline NAC Design Procedures
The
following
section
continues
the
Enterasys
NAC
design
procedure
with
steps
specifically
relating
to
the
implementation
of
inline
NAC
with
the
NAC
Controller.
1. Determine NAC Controller Location
Because
the
NAC
Controller
is
placed
inline
with
traffic
sourced
from
connecting
end
‐
systems,
the
location
of
NAC
Controllers
is
directly
dependent
on
the
network
topology.
NAC
Controllers
are
typically
placed
between
the
edge
where
end
‐
systems
connect
to
the
network
(for
example,
the
wired
and
wireless
access
edge,
or
the
remote
access
edge
behind
a
VPN
concentrator)
and
the
network
ʹ
s
core
and
data
center
where
mission
critical
infrastructure
resources
reside.
This
way,
noncompliant
end
‐
systems
can
be
restricted
from
communicating
to
mission
critical
resources.
With
the
NAC
Controller
acting
as
the
authorization
point
for
traffic
enforcement
with
inline
NAC,
there
is
a
fundamental
trade
‐
off
when
positioning
the
NAC
Controller
in
the
network
topology:
the
closer
the
NAC
Controller
is
placed
to
the
edge
of
the
network,
the
higher
the
level
of
security
is
achieved,
in
that
end
‐
systems
are
authorized
closer
to
the
point
of
connection
and
end
‐
systems
deemed
noncompliant
have
access
to
a
smaller
set
of
network
resources.
Содержание 9034385
Страница 1: ...Enterasys Network Access Control Design Guide P N 9034385...
Страница 2: ......
Страница 4: ...ii...
Страница 8: ...vi...
Страница 22: ...Summary 1 12 Overview...
Страница 98: ...Additional Considerations 5 34 Design Procedures...