You are on page 1of 7

www.novell.

com
Brochure
RESOURCE MANAGEMENT

Novell ZENworks ® ®

Network Access Control

1 2
Novell and Your Strong Perimeter

Fast pre-connect testing Novell® ZENworks® Network Access Control SC Magazine’s 2008 Reader Trust Award
that does not interfere stops unauthorized access, prevents mali- as the Best Endpoint Security Solution
with the end user’s cious endpoint activity and enforces specified A “Positive” rating in Gartner’s Marketscope
­logging on experience security policies. As the network access for Network Access Control in 2008
­control (NAC) solution of choice for many TechWorld’s 2007 Endpoint Security
Accurate and fast deep
organizations, ZENworks Network Access ­Product of the Year
testing using hundreds
Control protects some of the largest, most Windows IT Pro 2007 Editor’s Choice
of off-the-shelf tests
sensitive networks in the world, including SC Magazine’s 2006 Best Endpoint
Flexible endpoint
branches of the U.S. military. It has been ­Security Solution
­testing, enforcement
­honored with numerous awards, including:
and remediation
Continuous post-
connect monitoring Complete NAC
Windows OS and
Mac OS X coverage
Scalability that can
support hundreds of
thousands of endpoints
Identity-based
­management controls

Figure 1. This image shows how Novell ZENworks Network Access Control operates on the network. Based on
both pre-connect testing and post-connect monitoring, ZENworks Network Access Control enforces security
policies for managed and unmanaged endpoints belonging to users inside the firewall, remote users, contractors,
visitors and wireless users.

p. 2
Novell ZENworks Network Access Control www.novell.com

Novell ZENworks Network Access Control is or constrained by limited testing capabilities. The network access
a complete NAC solution, delivering on the It thoroughly evaluates endpoint health before ­control (NAC) solution
four vital areas of NAC: pre-connect testing, the device is allowed to forward traffic to the of choice for many
post-connect monitoring, identity-based network—a key requirement for true NAC— organizations, ZENworks
management and remediation. It gives and helps prevent unhealthy endpoints from Network Access Control
­administrators a NAC solution that has spreading damage. protects some of the
­comprehensive endpoint testing without largest, most sensitive
­affecting end-user productivity. It also delivers Pre-connect Endpoint Testing networks in the world,
an easy-to-use interface that allows you to including branches of
Novell ZENworks Network Access Control
see exactly who is on the network and what the U.S. military.
applies the most comprehensive scans to
they are doing. In addition, ZENworks Network
fully assess endpoint security. Using three
Access Control includes multiple enforcement
flexible endpoint testing options (agentless,
options for quarantining endpoints, enabling
Web-based and agent-based), ZENworks
you to enforce policy compliance across
Network Access Control allows a full range of
complex, heterogeneous networks. You can
devices, both Windows and Macintosh, to be
blend multiple enforcement options within a
tested thoroughly before being allowed onto
ZENworks Network Access Control imple-
the network. Novell adds new tests on an
mentation and manage those options from
ongoing basis, and you can develop custom
a single Web-based console. Enforcement
tests to meet organization-specific needs.
options include:
Pre-connect tests scan for:

802.1x enforcement and switch


OS support (Windows and Macintosh),
­configuration in the GUI
including Vista*
DHCP enforcement
OS Service Packs and hotfixes
Endpoint-based enforcement
Browser and OS security settings
In-line enforcement
Installed and up-to-date antivirus and
­antispyware software
Endpoint Health and True NAC Installed and up-to-date personal firewall
The proprietary testing and enforcement Presence of peer-to-peer applications
engine of Novell ZENworks Network Access Worms, viruses and trojans
Control provides extremely fast and thorough Presence of administrator-defined required
pre-connect endpoint testing for both or prohibited software
­Windows* and Macintosh* computers. And much more
End users are unaware of any delay in
the login process because device testing Post-connect Monitoring
takes only seconds. If quarantined, users are
Novell ZENworks Network Access Control
given clear instructions on how to remediate
continues to monitor the compliance of end­
the problem, so they can get back on the
points after network access has been granted.
network cleanly and securely.
As devices remain connected to the network,
they are periodically revalidated using the
Unlike other NAC solutions that are built on
same testing criteria used for the pre-connect
top of vulnerability scanners, intrusion detec-
assessment, ensuring that devices remain
tion/prevention (IDS/IPS) systems or personal
compliant throughout the session.
firewalls, ZENworks Network Access Control
is not weighed down by irrelevant processes

p. 3
ZENworks Network
Access Control is a
Multi-node Architecture
complete NAC solution,
delivering on the four vital
areas of NAC: pre-connect
testing, post-connect
monitoring, identity-
based management and
remediation. It provides
administrators with a
NAC solution that has
comprehensive endpoint
testing without affecting
end-user productivity.

Figure 2. In the multi-node architecture of Novell ZENworks Network Access Control, a single Management Server
controls multiple Enforcement Server clusters, regardless of the blend of enforcement options deployed. Multi-user,
role-based access is assignable at the cluster level. Access policies and tests are centrally managed. Reporting
and access data is rolled up at the cluster and corporate levels.

Management and Administration Where other NAC vendors make you use
the command line to configure features and
Regardless of the size or complexity of the functionality, ZENworks Network Access
network, Novell ZENworks Network Access Control has pulled those features into the GUI.
Control centrally consolidates the manage-
ment of all testing and enforcement activities, A single ZENworks Network Access Con-
providing a single-pane-of-glass view of end- trol Management Server controls multiple
point security. It provides administrators with Enforcement Servers (grouped together in
an easy-to-use, intuitive GUI that allows them clusters as shown in Figure 2). Enforcement
to quickly determine what is happening with Servers allow ZENworks Network Access
endpoints, who is quarantined and why. Control to seamlessly accommodate dis-
persed geographic locations, heterogeneous
The user interface simplifies deployment network topologies and the full range of
and provides easy access to many functions endpoint connection types (see Figure 3
usually reserved for back-end configuration. on the next page).

p. 4
Novell ZENworks Network Access Control www.novell.com

Managing Clusters Regardless of the size or


complexity of the network,
Novell ZENworks Network
Access Control centrally
consolidates the
management of all
testing and enforcement
activities, providing a
single-pane-of-glass
view of endpoint security.

Figure 3. This graphic shows how clusters are managed in the Novell ZENworks Network Access Control interface.
In the ZENworks Network Access Control GUI, the Cluster window displays real-time access control data and
performance statistics for the selected Enforcement Server cluster. In this example, the ‘Provo’ cluster is displayed,
which contains an individual Enforcement Server (znac-es.mycompany.com).

Through the Management Server, custom segment. Likewise, a spike in testing activity
tests and access policies can be distributed directed at a single Enforcement Server is
to all Enforcement Servers in a single opera- load balanced across the cluster.
tion. System monitoring and reporting are
rolled up at the cluster and corporate levels. Integrated in the IT Environment
Administrative access to the system is strictly
Novell ZENworks Network Access Control
controlled through user roles and cluster
features an open architecture that allows
assignments. Administrators may create
the import and export of data to and from
­additional roles using fine-grained permis-
­ZENworks Network Access Control. The open
sions. Devices and functions are exposed
architecture also allows third-party systems
on a need-to-know basis. For example,
to control testing and quarantining functions
an administrator may only view data for
and enables sharing of endpoint security
­endpoints within their assigned clusters.
data with other IT systems.

High Availability and ZENworks Network Access Control also


Load Balancing ­provides a DHCP plug-in, allowing companies
Novell ZENworks Network Access Control to have DHCP enforcement without requiring
provides true high availability capabilities. it to be in-line. In addition, SMB signing pro-
Should an Enforcement Server fail, other vides agentless testing and an added layer
servers within a cluster will automatically of security to specific Microsoft* endpoints.
provide coverage for the affected network

p. 5
Device Activity Window

Figure 4. The Device Activity window displays the testing and connection status of all devices attempting to
­connect to the network during the specified time period (one hour in this case).

Automated and Manual Repair, concise security status information on device


Minimal Impact on End Users compliance and access activity. Available
reports include: device list, actions taken,
Novell closes the NAC loop by facilitating a ­access policy results, test details, test results,
variety of remediation options for endpoints test results by device, test results by user,
that test non-compliant with your security test results by IP address and more.
policy, including automated remediation,
self-remediation and access grace period. Start Strengthening Your
­Perimeter Today
Administrators have complete control over
the depth and frequency with which end users Novell ZENworks Network Access Control is
are informed of testing activities and results. ready to help you take network security to the
Communication can be as visible or as invis- next level—by testing all of your endpoints
ible as necessary. End users may be notified before they connect to the network, proac-
of device testing, test results and the steps tively monitoring them after they connect and
needed to bring the endpoint into compliance. making it easy to enforce security policies and
perform remediation through a single manage­
Reporting for Management ment console. Visit www.novell.com/nac to
and Auditors learn more about how these crucial capabilities
can lead directly to less risk for your business;
Novell ZENworks Network Access Control lower IT costs and administrative requirements;
­includes robust reporting capabilities that and a safer, more stable and more compliant
­allow you to meet the needs of auditors, IT environment.
managers and IT staff. Reports provide

p. 6
www.novell.com

Contact your local Novell


Solutions Provider, or call
Novell at:

1 800 714 3400  U.S./Canada


1 801 861 1349  Worldwide
1 801 861 8473  Facsimile

Novell, Inc.
404 Wyman Street
Waltham, MA 02451 USA

463-001029-001 | 09/08 | © 2008 Novell, Inc. All rights reserved. Novell, the Novell logo, the N logo and ZENworks are r­ egistered
­trademarks of Novell, Inc. in the United States and other countries.

*All third-party trademarks are the property of their respective owners.

1 2

You might also like