Specifications
Out-of-Band NAC Design Procedures
5-24 Design Procedures
6. VLAN Configuration
ThisstepisforNACdeploymentsthatuseRFC‐3580‐compliantswitchesintheintelligentedgeof
thenetworktoimplementdynamicVLANassignmentofconnectingdevices.
NACleveragesVLANTunnelRADIUSattributemodificationinRADIUSauthentication
messagesfornetworkresourceallocationtoend‐systemsconnectedtotheseRFC3580‐compliant
switches.ThisrequiresthatbeforeNACisdeployedonthenetwork,eachRFC3580‐compliant
switchintheintelligentedgeofthenetworkisconfiguredwiththeappropriateVLANsthatmay
bereturnedfromtheNACGateways.AlistofVLANsthatmaybeassignedtoconnectingend‐
systemsforeach
SecurityDomainmustbegeneratedbyanalyzingtheAcceptPolicy,Assessment
Policy,FailsafePolicy,andQuarant inePolicyofthefollowing NACconfigurations:
•TheSecurityDomains’defaultNACconfigurations
•MACoverridesfortheSecurityDomains
•UseroverridesfortheSecurityDomains
•GlobalMACanduseroverrides
7. Policy Role Configuration
ThisstepisforNACdeploymentsthatuseEnterasyspolicy‐enabledswitchesintheintelligent
edgeofthenetworktoimplementdynamicpolicyassignmentofconnectingdevices.
NACleveragesFilter‐IDRADIUSattributemodificationinRADIUSauthenticationmessagesfor
networkresourceallocationtoend‐systemsconnectedtotheseEnterasysswitches.Therefore,
beforeNACisdeployedonthenetwork,eachEnterasysswitchintheintelligentedgeofthe
networkmustbeconfiguredwiththeappropriatepolicyrolesthatmaybereturnedfromtheNAC
Gateways.Alistofpolicyrolesthatmaybeassignedtoconnectingend‐systemsforeachSecurity
Domain
canbegeneratedbyanalyzingtheAcceptPolicy,AssessmentPolicy,FailsafePolicy,and
QuarantinePolicyofthefollowingNACconfigurations:
•TheSecurityDomains’defaultNACconfiguration
•MACoverridesfortheSecurityDomains
•UseroverridesfortheSecurityDomains
•GlobalMACanduseroverrides
8. Define NAC Access Policies
AccesspoliciesdefinetheauthorizationlevelthatNACassignstoaconnectingend‐systembased
ontheend‐systemʹsauthenticationand/orassessmentresults.Therearefouraccesspoliciesused
inNACManager:FailsafePolicy,AcceptPolicy,QuarantinePolicy,andAssessmentPolicy.Inyour
securitydomainandoverrideconfigurations,theseaccess
policiesdefineasetofnetworkaccess
servicesthatdetermineexactlyhowanend‐systemʹstrafficisauthorizedonthenetwork.
WhenEnterasyspolicy‐enabledswitchesaredeployedintheintelligentedgeofthenetworkto
authenticateandauthorizeconnectingend‐systems,theseswitchesmustbeconfiguredwith
access
policiesbeforeNACisdeployed.NetSightPolicyManagerenablestheenterprise‐wide
deploymentofpolicyrolestoEnterasyspolicy‐enabledswitches,withasingleclick.
Inadditiontotheenterpriseʹsbusinessspecificroles,suchas“Faculty”or“Sales,”NACpolicy
rolesmustbedefined,configured,andenforcedtothenetwork
forNAC.Allpolicyroles