Enterasys Networks 9034385 User Manual
Page 6

iv
Policy-Enabled Edge ................................................................................................................................ 3-2
RFC 3580 Capable Edge ......................................................................................................................... 3-3
Scenario 1 Implementation ...................................................................................................................... 3-4
Thin Wireless Edge .................................................................................................................................. 3-5
Thick Wireless Edge ................................................................................................................................ 3-7
Scenario 2 Implementation ...................................................................................................................... 3-8
Identify the NAC Deployment Model .............................................................................................................. 4-1
Survey the Network ........................................................................................................................................ 4-2
1. Identify the Intelligent Edge of the Network .......................................................................................... 4-2
2. Evaluate Policy/VLAN and Authentication Configuration ..................................................................... 4-4
Case #1: No authentication method is deployed on the network. ......................................................4-4
Case #2: Authentication methods are deployed on the network. .......................................................4-5
3. Identify the Strategic Point for End-System Authorization ................................................................... 4-8
4. Identify Network Connection Methods ................................................................................................. 4-9
Wired LAN ..........................................................................................................................................4-9
Wireless LAN......................................................................................................................................4-9
Remote Access WAN .......................................................................................................................4-10
Site-to-Site VPN ...............................................................................................................................4-10
Remote Access VPN ........................................................................................................................4-11
1. Identify Required NetSight Applications ............................................................................................... 5-1
2. Define Network Security Domains ....................................................................................................... 5-2
MAC Overrides .................................................................................................................................5-12
User Overrides .................................................................................................................................5-16
1. Determine the Number of Assessment Servers ................................................................................. 5-17
2. Determine Assessment Server Location ............................................................................................ 5-18
3. Identify Assessment Server Configuration ......................................................................................... 5-18
1. Identify Network Authentication Configuration ................................................................................... 5-19
2. Determine the Number of NAC Gateways ......................................................................................... 5-20
3. Determine NAC Gateway Location .................................................................................................... 5-22
4. Identify Backend RADIUS Server Interaction ..................................................................................... 5-23
5. Determine End-System Mobility Restrictions ..................................................................................... 5-23
6. VLAN Configuration ........................................................................................................................... 5-24
7. Policy Role Configuration ................................................................................................................... 5-24
8. Define NAC Access Policies .............................................................................................................. 5-24