Enterasys-networks 9034385 Manuel d'utilisateur Page 97

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 98
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 96
Additional Considerations
Enterasys NAC Design Guide 5-33
assessmentserverstoreachtheendsystemwhileitisbeingassessed,regardlessofwhetherthe
Assessingpolicy,EnterpriseUserpolicy,oranyotherpolicyroleisutilizedforassessment.
TheQuarantinePolicyisusedtorestrictnetworkaccesstoendsystemsthathavefailed
assessment.TheQuarantinepolicyroleis
configuredbydefaultontheNACControllertobeused
astheQuarantinePolicyinNACManager.Thispolicyisrestrictive,allowingDNSandDHCP,and
redirectingwebtraffictoservebackawebpagestatingtheendsystemhasbeenrestrictedaccess
becauseitisdeemednoncompliant.Allothertypes
oftrafficarediscarded.Ifitisdesiredtoopen
networkaccesswhenanendsystemfailstheassessment,theuseoftheQuarantinePolicycanbe
disabledintheNACConfigurationortheEnterpriseUserpolicyrolecanbeselectedasthe
QuarantinePolicy.
Unregistered Policy
IfMAC(network)registrationistobeconfiguredonLayer2NACControllers,theUnregistered
policyroleconfiguredbydefaultontheNACControllercanbeusedfortheAcceptPolicyof
unregistereddevices.Thispolicyisrestrictive,allowingDNSandDHCP,and redirectingweb
traffictoservebackaregistration
webpagestatingtheendsystemhasbeenrestrictedaccess
becauseithasnotyetregistered.Allothertypesoftrafficarediscarded.
Additional Considerations
ThissectionpresentsadditionaldesignconsiderationsforbothinlineandoutofbandNAC
deployments.
NAC Deployment With an Intrusion Detection System (IDS)
NACdeploymentsthatimplementendsystemassessmentcomplementnetworking
environmentswithIDStechnologiesthatdetectrealtimesecurityeventsonthenetwork.While
endsystemassessmentdeterminesthesecuritypostureofconnectingdevicesand mitigates
threatsposedbyvulnerableendsystems,itdoesnotdeterminetheenduserʹsintentions,whether
maliciousorbenevolent.Therefore,IDStechnologiescanmonitorhowanendsystemutilizes
networkresourcesafterNAChasvalidatedthesecurityposturecomplianceoftheendsystem.
However,endsystemassessmentsutilizedinNACmaybeclassifiedbyanIDS(dependingonits
configuration)asanattack.Therefore,ifthe
trafficfromtheassessmentservertraversesanetwork
linkthatismonitoredbyanIDSsensor,theIDSmustbeconfiguredtonotgeneratesecurityevents
fortrafficsourcedfromtheassessmentserversIPaddress.ThesameappliesforIPSsystems.
NAC Deployment With NetSight ASM
NetSightASMcanbeconfiguredtonotifythelocallyinstalledNACManagertodynamically
configureaMACoverrideforathreatMACaddressonthenetwork.Whenasecuritythreatis
detectedonthenetwork,eitherthroughEnterasysDragonIDSorathirdpartydevice,andthe
securitythreatiscommunicated
toNetSightASMforanautomatedresponse,ASMcanthen
quarantinethesourceoftheattackat theportofconnectionusingpolicy,andalsocommunicate
thisquarantineactiontoNAC.Iftheendsystemsourcingthesecuritythreatmovestoadifferent
portonthenetwork,theendsystem
willremainquarantined,duetoadynamicallyconfigured
MACoverride,toprotectthenetworkfromthepossibilityoffutureattacks.Therefore,the
deploymentofNACnotonlyproactivelyprotectsthenetworkfromsecuritythreatsposedby
vulnerableendsystems,butitalsoempowersthenetworkʹsdynamicresponsecharacteristicsto
real
timethreatsdetectedfromendsystems.
Vue de la page 96
1 2 ... 92 93 94 95 96 97 98

Commentaires sur ces manuels

Pas de commentaire