Specifications

Out-of-Band NAC Design Procedures
5-24 Design Procedures
6. VLAN Configuration
ThisstepisforNACdeploymentsthatuseRFC3580compliantswitchesintheintelligentedgeof
thenetworktoimplementdynamicVLANassignmentofconnectingdevices.
NACleveragesVLANTunnelRADIUSattributemodificationinRADIUSauthentication
messagesfornetworkresourceallocationtoendsystemsconnectedtotheseRFC3580compliant
switches.ThisrequiresthatbeforeNACisdeployedonthenetwork,eachRFC3580compliant
switchintheintelligentedgeofthenetworkisconfiguredwiththeappropriateVLANsthatmay
bereturnedfromtheNACGateways.AlistofVLANsthatmaybeassignedtoconnectingend
systemsforeach
SecurityDomainmustbegeneratedbyanalyzingtheAcceptPolicy,Assessment
Policy,FailsafePolicy,andQuarant inePolicyofthefollowing NACconfigurations:
•TheSecurityDomains’defaultNACconfigurations
•MACoverridesfortheSecurityDomains
•UseroverridesfortheSecurityDomains
•GlobalMACanduseroverrides
7. Policy Role Configuration
ThisstepisforNACdeploymentsthatuseEnterasyspolicyenabledswitchesintheintelligent
edgeofthenetworktoimplementdynamicpolicyassignmentofconnectingdevices.
NACleveragesFilterIDRADIUSattributemodificationinRADIUSauthenticationmessagesfor
networkresourceallocationtoendsystemsconnectedtotheseEnterasysswitches.Therefore,
beforeNACisdeployedonthenetwork,eachEnterasysswitchintheintelligentedgeofthe
networkmustbeconfiguredwiththeappropriatepolicyrolesthatmaybereturnedfromtheNAC
Gateways.AlistofpolicyrolesthatmaybeassignedtoconnectingendsystemsforeachSecurity
Domain
canbegeneratedbyanalyzingtheAcceptPolicy,AssessmentPolicy,FailsafePolicy,and
QuarantinePolicyofthefollowingNACconfigurations:
•TheSecurityDomains’defaultNACconfiguration
•MACoverridesfortheSecurityDomains
•UseroverridesfortheSecurityDomains
•GlobalMACanduseroverrides
8. Define NAC Access Policies
AccesspoliciesdefinetheauthorizationlevelthatNACassignstoaconnectingendsystembased
ontheendsystemʹsauthenticationand/orassessmentresults.Therearefouraccesspoliciesused
inNACManager:FailsafePolicy,AcceptPolicy,QuarantinePolicy,andAssessmentPolicy.Inyour
securitydomainandoverrideconfigurations,theseaccess
policiesdefineasetofnetworkaccess
servicesthatdetermineexactlyhowanendsystemʹstrafficisauthorizedonthenetwork.
WhenEnterasyspolicyenabledswitchesaredeployedintheintelligentedgeofthenetworkto
authenticateandauthorizeconnectingendsystems,theseswitchesmustbeconfiguredwith
access
policiesbeforeNACisdeployed.NetSightPolicyManagerenablestheenterprisewide
deploymentofpolicyrolestoEnterasyspolicyenabledswitches,withasingleclick.
Inadditiontotheenterpriseʹsbusinessspecificroles,suchas“Faculty”or“Sales,”NACpolicy
rolesmustbedefined,configured,andenforcedtothenetwork
forNAC.Allpolicyroles