Specifications

Policy Overview
May 18, 2009 Page 3 of 32
Standard and Enhanced Policy on Enterasys Platforms
Therearetwosetsofpolicycapabilitiessupported,dependingupontheEnterasysplatform.
Standardpolicyissupportedonallplatforms.Standardpolicyrepresentsthebasepolicysupport
forEnterasysplatforms.Enhancedpolicyisanadditionalsetofpolicycapabilitiessupportedon
theNSeriesplatforms.Unlessapolicycapabilityorfunction
iss pecifiedasbeingamemberofthe
enhancedpolicysetorotherwisequalified,inthisdiscussion,standardpolicyisassumed,andthe
capabilityappliestoallEnterasysplatforms tha tsupportpolicy.
The Enterasys NetSight Policy Manager
EnterasysNetSightPolicyManagerisamanagementGUIthatautomatesthedefinitionand
enforcementofnetworkwidepolicyrules.Iteliminatestheneedtoconfigurepoliciesona
devicebydevicebasisusingcomplexCLIcommands.ThePolicyManagersGUIprovideseaseof
classificationruleandpolicyrolecreation,becauseyou
onlydefinepoliciesonceusinganeasyto
understandpointandclickGUI—andregardlessofthenumberofmoves,addsorchangestothe
policyrole,PolicyMa nager automaticallyenforcesrolesonEnterasyssecurityenabled
infrastructuredevices.
Thisdocumentpresentspolicyconfigurationfromthe perspectiveoftheCLI.Though
itispossible
toconfigurepolicyfromtheCLI,CLIpolicyconfigurationinevenasmallnetworkcanbe
prohibitivelycomplexfromanoperationalpointofview.Itishighlyrecommendedthatpolicy
configurationbeperformedusingtheNetSightPolicyManager.TheNetSightPolicyManager
provides:
Easeofruleandpolicy
rolecreation
•Theabilitytostoreandandretrieverolesandpolicies
•Theability,withasingleclick,toenforcepolicyacrossmultipledevices
TheofficialPolicyManagerdocumentationisaccessedusingonlinehelpfromwithinthe
application.ThisonlinedocumentationcompletelycoverstheconfigurationofpolicyinaPolicy
Managercontext.
ForaccesstothePolicyManagerdatasheetortosetupademooftheproduct,
seehttp://www.enterasys.com/products/visibilitycontrol/netsightpolicymanager.aspx.
Understanding Roles in a Secure Network
ThecapacitytodefinerolesisdirectlyderivedfromtheabilityoftheMatrixNSeries,SecureStack,
andstandalonedevicestoisolatepacketflowsby inspectingLayer2,Layer3,andLayer4packet
fieldswhilemaintaininglinerate.Thiscapabilityallowsforthegranularapplicationofapolicyto
a:
•Specificuser(MAC,IPaddressorinterface)
•Groupofusers(maskedMACorIPaddress)
•System(IPaddress)
•Service(suchasTCPorUDP)
•Port(physicalorapplication)
Becauseusers,devices,andapplicationsareallidentifiablewithinaflow,anetworkadministrator
hasthecapacitytodefineandcontrolnetworkaccessandusage
bytheactualroletheuseror
deviceplaysinthenetwork.Thenatureofthesecuritychallenge,applicationaccess,oramountof
networkresourcerequiredbyagivenattacheduserordevice,isverymuchdependentuponthe
“role”thatuserordeviceplaysintheenterprise.Definingand
applyingeachroleassuresthat