Enterasys-networks 9034385 Manuel d'utilisateur Page 56

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 98
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 55
Survey the Network
4-4 Design Planning
FortheinlineimplementationoftheEnterasysNACsolution,theNACControllerauthenticates
andauthorizesendsystemslocallyontheappliance,anddoesnotrelyonthecapabilitiesof
downstreaminfrastructuredevices.Becauseofthis,theNACControllercanbeutilizedin
networkswherenonintelligentand/orintelligentinfrastructuredevicesexist
attheedgeofthe
network.Ifthenetworkdoesnothaveanintelligentedge,thentheNACControllermustbe
deployedinordertoprovidetheauthenticationandauthorizationcapabilitiesrequiredfor
implementingnetworkaccesscontrol,asshowninFigure 42.
Figure 4-2 Network with Non-Intelligent Edge
2. Evaluate Policy/VLAN and Authentication Configuration
Foranetworkwithanintelligentedge,thesecondstepinsurveyingyournetworkistoevaluate
thenetworkauthenticationmethodcurrentlybeingused,andhowthedeploymentofEnterasys
NACwillaffectit.Anetworkwithanintelligentedgecanbeclassifiedintooneoftwocases:either
authenticationis
deployedonthenetworkoritisnot.
Case #1: No authentication method is deployed on the network.
Ifauthenticationisnotconfiguredonthenetwork,outofbandNACcanbedeployedwith
minimalconfigurationbyim plementingMACauthenticationontheintelligentedgeofthe
network(iftheedgeswitchessupportMACauthentication).TheNACGatewaycanbeconfigured
Note: This step is not necessary if in step 1 you determined that the network does not have an
intelligent edge and the inline NAC Controller appliance will be deployed to provide the
authentication and policy enforcement capabilities.
Vue de la page 55
1 2 ... 51 52 53 54 55 56 57 58 59 60 61 ... 97 98

Commentaires sur ces manuels

Pas de commentaire