Understanding Access Control Policy
Genian NAC 6.0 uses 3 main policies to control network access, IP/MAC Policy, Node Policy, and Enforcement Policy.
IP/MAC Policy
IP and MAC features allow an administrator to manually or automatically control a devices IP address, and to allow / deny network access based off of IP or MAC address.
To use these features in Genian NAC 6.0, you must configure the network sensor(s) in enforcement mode and enable an IP/MAC policy. This section will explain how to enable IPAM policy, enforce Conflict/Change Prevention, and set up time allowances for IP/MAC addresses.
Node Policy
Node Policies are mainly used for collecting information from Nodes, and managing their network presence while they are in a compliant state. Node Policies allow you to establish Authentication Policies based on User, Node, and Authentication method, as well as to define the standard operation of the endpoint agent and more.
To configure a Node Policy, create or use existing Node Groups (Managing Node Groups)
Next, navigate to Policy > Node Policy and select Tasks > create.
Follow the Policy creation prompts to apply the policy to groups and configure options.
See:
Enforcement Policy
Enforcement Policy consists of the following two components for Attribute-Based Access Control (ABAC).
Compliance Policy
This defines "what to block when non-compliant". It sequentially checks Compliance that a node accessing the network must comply with.
Regulations are evaluated from top to bottom, and the first matching Enforcement Policy is applied to the node.
If no Enforcement Policy matches, the Permission Policy is applied.
Enforcement Policy and Permission Policy are not applied simultaneously.
Permission Policy
This defines "what can be done". It declaratively grants services/permissions accessible to nodes that have complied with all Enforcement Policies.
Uses a permission-centric node assignment model. A single node can have multiple permissions simultaneously.
There is no policy order; the node is granted the union of permissions from all Permission Policies it belongs to.
RADIUS Policy
To configure the policy, you must use an existing User Group or create a new one.
Next, navigate to Policy > RADIUS Policy > Tasks > Create.
Follow the policy creation procedure to assign a User Group to the policy, add conditions, and configure detailed policy settings.