We tested Enterasys NAC in its edge-enforcement mode, using a single NAC Manager and single NAC Gateway to control our Cisco, HP and Juniper switches. Enterasys also sent us one of its switches, which we threw into the mix. Our testing focused on 802.1X-type NAC deployments, and the Enterasys NAC was both easy to deploy and performed well on our heterogeneous network.
As we expected with any mature NAC product, we found our fair share of ambiguities and design flaws in the management system. Still, the NAC Manager ended up being fairly easy to use.
Enterasys has a broad product line, including captive portal functionality, guest registration, and the ability to accept external security inputs (such as from its Dragon IDS product) into the NAC decision-making process.
We also found some particularly elegant thinking in the Enterasys NAC product. For example, Enterasys NAC uses DiffServ packet tagging and policy-based routing to force unauthenticated users to their captive portal, a very clever solution that avoids the problems associated with changing user VLANs on the fly.
Obviously, Enterasys NAC works best with their own switches, which have a fairly sophisticated access control list feature built-in, but we were able to push both VLAN and access control lists to all of the non-Enterasys switches in our network very easily.
As a very strong product, Enterasys NAC also includes the usual endpoint security checking features. Both an on-network scan using Saint Corporation’s network scanner, and an on-device scan using the Enterasys agent, are supported.
Enterasys has done a good job making sure that its NAC product works very well in non-Enterasys networks. Because Enterasys NAC has both in-line and edge-enforcement technologies in a single product line, we think that this is a definite short-list for any 802.1X-based NAC deployment.