Evaluate Policy/Vlan And Authentication Configuration; Case #1: No Authentication Method Is Deployed On The Network; Network With Non-Intelligent Edge - Enterasys 9034385 Design Manual

Nac solution
Table of Contents

Advertisement

Survey the Network
For the inline implementation of the Enterasys NAC solution, the NAC Controller authenticates 
and authorizes end‐systems locally on the appliance, and does not rely on the capabilities of 
downstream infrastructure devices. Because of this, the NAC Controller can be utilized in 
networks where non‐intelligent and/or intelligent infrastructure devices exist at the edge of the 
network. If the network does not have an intelligent edge, then the NAC Controller must be 
deployed in order to provide the authentication and authorization capabilities required for 
implementing network access control, as shown in Figure
Figure 4-2

2. Evaluate Policy/VLAN and Authentication Configuration

For a network with an intelligent edge, the second step in surveying your network is to evaluate 
the network authentication method currently being used, and how the deployment of Enterasys 
NAC will affect it. A network with an intelligent edge can be classified into one of two cases: either 
authentication is deployed on the network or it is not.

Case #1: No authentication method is deployed on the network.

If authentication is not configured on the network, out‐of‐band NAC can be deployed with 
minimal configuration by implementing MAC authentication on the intelligent edge of the 
network (if the edge switches support MAC authentication). The NAC Gateway can be configured 
4-4 Design Planning

Network with Non-Intelligent Edge

Note: This step is not necessary if in step 1 you determined that the network does not have an
intelligent edge and the inline NAC Controller appliance will be deployed to provide the
authentication and policy enforcement capabilities.
4‐2.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network access control

Table of Contents