- The end user machine connects to the Authenticator, which can be a WLAN access point or a LAN switch.
- The Authenticator sets the port to ‘unauthorized’, which will only permit 802.1X traffic, and requests authentication data from the endpoint. The endpoint returns it’s authentication data to the Authenticator.
- The Authenticator knows the Authentication server, and forward to the request to authentication server (typically a RADIUS server). The radius server returns a pass/fail.
- Once the authentication is successful, the Authenticator opens the port for the supplicant to join the network.
- Is this secure enough for the environment? Requires a risk analysis for the given environment.
- Is the existing environment’s architecture suitable for this enforcement? Possibilities here include placing a NAC server inline with DHCP.
- Does it require a significant additional outlay for the equipment?
Policy and remediation services are the last part of NAC picture, though the endpoint assessment is done against the policy set by administrator at the very start of NAC process. Once the assessment is carried out on the endpoint, and matched against the policy for compliance, the decision to restrict or allow the endpoint is taken. If the endpoint is restricted due to a failure to comply with one or more policies, the endpoint is quarantined.
The next logical step is to seek to remediate the endpoint. The task of a remediation service is to make the endpoint compliant to the policy, thus restoring the access to join the network for services in a healthy state. The remediation process may be single or multiple steps. For example, if an endpoint does not have current Anti-virus definition and lacks critical Microsoft patches, then the remediation process directs the endpoint to the current Anti-virus definition and required Microsoft patches (either from Microsoft itself or on the internal patch distribution server or process).
The endpoint security posture should also be regularly re-tested, so as to remain proactive. The results of this continuous monitoring of the endpoint posture and status of compliance must be reported promptly. Another final point to consider here is the execution and delivery of policy, either to the endpoint or enforcement point. The frequency and protocol for delivery are equally important in this whole NAC framework. Needless to say the policy has to be regularly backed-up, and the facility to restore from backed-up policies should be regularly tested. Considerations for the remediation and policy service are:
- Placement and capacity of remediation servers, for example the patch distribution mechanism etc.
- Will remediation be self-service, or will be performed by help desk?
- How does the remediation server obtain the third-party details such as the Anti-virus and other malware definition currency, MS patches levels etc.
- What mechanism is in place for communication between the remediation servers and the policy server?