Enterasys-networks 9034385 Manuel d'utilisateur Page 64

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 98
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 63
Summary
4-12 Design Planning
server.Inaddition,NACcanalsobeconfiguredtolocallyauthorizeMACauthentication
requests.
3. Identifythestrategicpointinthenetworkwhereendsystemauthorizationshouldbe
implemented.
Themostsecureplaceforimplementingauthorizationisdirectlyatthepointofconnectionat
theedgeofthenetwork,assupportedby
Enterasyspolicycapableswitches.Inthis
configuration,theimplementationofoutofbandNACusingtheNACGatewayappliance
leveragespolicyonEnterasysswitchestosecurelyauthorizeconnectingendsystems.
Ifthenetworkinfrastructuredoesnotcontainintelligentdevicesattheedgeordistribution
layer,theninlineNACusingtheNAC
Controllerastheauthorizationpointforconnecting
endsystemsmustbeimplemented.
4. Identifythenetworkconnectiontypesbeingused.Thepreviousstepshavebeenconcerned
withimplementingNACfortheinternalLAN.Inthisstep,thefollowingconnectiontypesare
discussedalongwiththeirimpactontheEnterasysNACsolution.
–Wired
LAN
WirelessLAN
–RemoteAccessWAN
–SitetoSiteVPN
–RemoteAccessVPN
BasedontheNACdeploymentmodelyouselect,andtheresultsofyournetworkinfrastructure
evaluation,youwillbeabletoidentifywhetheroutofbandNACorinlineNACwillbedeployed
inthedifferentareasofyournetwork.
Vue de la page 63
1 2 ... 59 60 61 62 63 64 65 66 67 68 69 ... 97 98

Commentaires sur ces manuels

Pas de commentaire