Access Requestor and Policy Decision Point in

Size: px
Start display at page:

Download "Access Requestor and Policy Decision Point in TNC@FHH"

Transcription

1 Overview Access Requestor and Policy Decision Point in by Martin Schmiedel September 2006 Fachhochschule Hannover Fachbereich Informatik

2

3 Author: Martin Schmiedel (M.Sc., Diplom-Informatiker (FH)) Fachhochschule Hannover Fachbereich Informatik 3

4 4

5 Contents 1 Introduction 7 2 Basic conditions and requirements Basic conditions Non-functional Requirements Functional Requirements Access Requestor for Windows Architecture Network Access Requestor Architecture of NAR Implementation of EAPOL and EAP-TNC Flow inside NAR during connection establishment Flow during Handshake TNC Client Architecture Overview Flows inside TNC Client Development Environment and Build Process Development Environment Build of AR Development of network driver NDISProt Adjustment and Compilation of NDISProt Installation of NDISProt driver Development of User Interface Basics and Technics wxwidgets as GUI framework Policy Decision Point for Linux Overall Architecture Network Access Authority Architecture Overview NAA Flow inside NAA TNC Server Architecture Overview TNCS Flow inside TNC Server End of Handshake and Policy Management

6 Contents 4.4 Development Development Environment Development support for the build of TNCS-SO Development of EAP-TNC Module Development of EAP-TNC Module from FreeRadius Configuration of FreeRadius Extension of EAP Module Generation of EAP submodule EAP-TNC Build of PDP Configuration file tncs fhh.conf Client/Server-spanning concepts Concepts for Platform independence Connecting the IML TNCCS Communication and Fragmentation TNCCS creation and analysis Fragmentation of messages Configuration of network environment 45 A Design Documents 49 A.1 Sequence diagrams A.2 Class diagrams A.3 TNC Client Screenshots B Development, Installation and Configuration 57 B.1 Development Environment in Windows B.2 Entwicklungsumgebung unter Linux B.3 Installation von NDISProt B.4 Build of wxwidgets B.5 Configuration files Bibliography 69 List of Figures 71 6

7 1 Introduction In the project the TNC architecture was built up in a protypical way based on 802.1x in wired Ethernet LANs. This document shall explain the main ideas and design decisions of the developed components Access Requstor and Policy Decision Point and how to build, install and run these components. The developed IMV-IMC-pairs are subject of a different document. It is assumed that the reader is familiar with TNC architecture, it s components and the interfaces. 7

8 1 Introduction 8

9 2 Basic conditions and requirements 2.1 Basic conditions These are the general conditions that were the basis for the development: No commercial targets, only academic ideals use only third-party software that is available for everyone develop with free available IDEs use 802.1x in wired ethernet infrastructures as underlying technology run with any switch that supports 802.1x (tested only with HP Procurve Switches) 2.2 Non-functional Requirements These non-functional requirements were important for the project: develop open source use C and C++ and the C Platform Bindings from IF-IMC and IF-IMV AR runs in Windows XP environment PDP runs in Linux environment (tested with SuSE 9.3) But both components should be easily portable TNC specifications must be implemented as exact as possible (IF-IMC 1.1, IF-IMV 1.1, IF-PEP 1.0, IF-T EAP Methods 1.0, IF-TNCCS) Use 802.1x in NAL and communicate via IF-T 9

10 2 Basic conditions and requirements 2.3 Functional Requirements These are the functions that have been implemented: Integrity of Windows clients can be checked. Integrity check results in one of three action recommendations: access denied, access allowed, isolated access allowed Action recommendations result from a simple security policy. Switch transfers these recommendations to actions on the specific port. Assignment to VLANs depending on the result is supported (via IF-PEP). No automatical remediation of AR is supported (only assignment to remediation VLAN). 10

11 3 Access Requestor for Windows 3.1 Architecture AR is designed as one only application that has to be started manually by the user and does not run in the background. Because of that integrity check is visible and understandable for the user. The overall architecture is shown in picture 3.1. AR is built up of application Figure 3.1: Overall architecture of AR in Deployment Diagram 11

12 3 Access Requestor for Windows TNC-AR and IMC components (DLLs) that are connected to TNC-AR as described in Windows Platform Binding of IF-IMC. TNC-AR includes two components that are similar to the components defined in TNC architecture. These components are loosely coupled so that you can easily change the network technology in NAL without touching component TNC Client. You find a detailled class diagram with all classes of AR in appendix (chapter A.2). The facades between the components of AR are shown in picture 3.2. Figure 3.2: Facades between components of AR 12

13 3.2 Network Access Requestor 3.2 Network Access Requestor Architecture of NAR The static architecture of NAR is shown in picture 3.3. Figure 3.3: Static architecture of NAR Classes of NAR have clearly separated tasks: NARFascade is access point to NAL for TNC Client. Interface is independent of the network access technology used in NAL. NetAccessControl works as flow control and controls the correct 802.1x flow and all other classes. WinNetAccessor implements access to the network out of Windows (implemented by using a NDIS protocol driver, see chapter 3.5). PacketGenerator creates EAPOL packets with encapsulated EAP-TNC packets. PacketValidator analyses ethernet packets received by WinNetAccessor according to their 802.1x contents. FragmentationManager cares of fragmentation and defragmentation of messages. For detailled descriptions see comments in source code. 13

14 3 Access Requestor for Windows Implementation of EAPOL and EAP-TNC The two classes PacketGenerator and PacketValidator (see picture 3.4) are responsible for analysis of incoming and creation of outgoing ethernet packets. Figure 3.4: Classes for Packet generation and validation Using theses classes NetAccessControl can easily create ethernet packets and can check the relevance of incoming packets to the actual context. For detailled descriptions see comments in source code Flow inside NAR during connection establishment Roughly you can split the flows inside the NAR in two phases: In the first phase the NAR establishs the connection to PDP so that in the second phase TNCCS messages can be transfered between AR and PDP. The flow of the first phase is shown in picture Flow during Handshake In the second phase NAR is responsible for sending and receiving TNCCS messages. The flow (see picture 3.6) is started by TNC Client everytime the TNC Client wants to send a new TNCCS message. In the shown flow we have excluded the fragmentation of messages for simplicity (for fragmentation see chapter 5.3.2). 3.3 TNC Client 14

15 3.3 TNC Client Figure 3.5: Flow inside NAR during connection establishing 15

16 3 Access Requestor for Windows Figure 3.6: Flow in NAR while sending and receiving TNCCS messages Architecture Overview Classes inside the component TNC Client are shown in picture 3.7. These are their tasks: FlowControl controls the flow inside TNC Client. TNCCFascade is access point to the TNC Client for GUI. TNCCSMsgMaster analyses and creates TNCCS messages. ImcImvMsgCoordinator distributes IMC-IMV messages to the IMC components. IMCCommunicator communicates with IMCs via IF-IMC-interface. WinIMCCollector loads IMCs according to Windows Binding from IF-IMC. ImcImvMsgRepository stores messages that should be sent from IMCs to IMVs and that have been sent by IMVs to IMCs. For detailled descriptions see comments in source code. 16

17 3.3 TNC Client Flows inside TNC Client Figure 3.7: Classes inside TNC Client The sequence diagram in picture 3.8 shows the flow inside TNC Client. More detailled sequence diagrams to the flows in TNC Client can be found in chapter A.1 in appendix. 17

18 3 Access Requestor for Windows Figure 3.8: Overview of flows in TNC Client 18

19 3.4 Development Environment and Build Process 3.4 Development Environment and Build Process Development Environment The AR has been developed with Eclipse in Windows XP. The Eclipse-Plugin CDT (C/C++ Development Tooling) SDK allows the development of C and C++ application out of Eclipse Build of AR The Access Requestor is designed as executable application (*.exe) for the Cygwin environment 2. So an emulated gcc is used for compiling the application in Windows. In Eclipse we created a Managed Make C++ Project for the AR so that the AR can be built completely out of Eclipse with CDT. The parameters that have to be set in the Eclipse project are listed in appendix B.1. Especially the usage of wxwidgets as framework for the GUI needs several settings (also see 3.6). 3.5 Development of network driver NDISProt Adjustment and Compilation of NDISProt For accessing the network we need the NDIS Protocol Driver NDISProt because we did not find any other possibility to access the ethernet network (without any stack like TCP/IP) directly from C code out of Windows. This driver is one of the examples from Windows Driver Development Kit. There you can find the driver and an application for testing this driver. Both have to be compiled before we can use them. Customization of NDISProt For the usage in the TNC architecture we have to make some customizations to the driver. Because the driver cannot per default receive packets that are addressed to the address defined in 802.1x for the communication via EAPOL (see [IEE04, p. 31], C ) we have to add another packet type to ndisprot.h. This type is All Multicast (see Listing 3.1). #define NUIOO_PACKET_FILTER (NDIS_PACKET_TYPE_DIRECTED \ NDIS_PACKET_TYPE_MULTICAST \ NDIS_PACKET_TYPE_BROADCAST \ NDIS_PACKET_TYPE_ALL_MULTICAST)

20 3 Access Requestor for Windows Listing 3.1: Customizations in ndisprot.h Compilation of NDISProt Using the Build Environment included in the DDK we can compile NDISProt as described in the documentation of this DDK example (see Figure 3.9). Figure 3.9: Build of NDISProt in Windows Server 2003 Free Build Environment After that the setup information file ndisprot.inf and the driver ndisprot.sys have been created and are ready for service Installation of NDISProt driver Now the generated network driver can be installed as protocol for the network card (see Screenshots in appendix B.3). The setup information file ndisprot.inf states that the driver should be started manually. The command is: net start ndisprot Now ethernet packets can be received via ReadFile method and sent via WriteFile method out of C/C++ applications. 20

21 3.6 Development of User Interface Figure 3.10: TNC Client user interface: Integrity assessment ends with granted access. 3.6 Development of User Interface Basics and Technics One target of was to make the integrity check as transparent as possible. Therefore a user interface has been developed so that the user can control the integrity check and can exactly see what happens. Picture 3.10 shows a screenshot of the user interface. Using this GUI the user is able to choose the network interface that should be used for integrity assessment. see which IMCs are installed and available for integrity check and exclude untrustworthy IMCs from integrity check. activate detailled logging to a file with a lot of information about the handshake. see the actual state of check via a log window. cancel the test whenever he wants. 21

22 3 Access Requestor for Windows wxwidgets as GUI framework The user interface of TNCC has been developed by using wxwidgets 3. WxWidgets allows the development for different plattforms with one code-basis. This property can help porting the TNCC to Linux later on. In this project we use wxwidgets in Version Before you can use wxwidgets it has to be installed and built. How this works is described in appendix B.4. The settings for using wxwidgets inside Eclipse can be found in [Don04] and the setting needed in the context of this project are described in B

23 4 Policy Decision Point for Linux 4.1 Overall Architecture Figure 4.1 shows the overall architecture of PDP. PDP is designed as a plugin to FreeRadius RADIUS server. The existing EAP module of FreeRadius has been extended with EAP-TNC functionality (see chapter 4.4.3). So we can reuse network access, RADIUS functionality and EAP functionality. All but the base functionality is linked as shared object so that development is much easier. A detailled class diagram with all classes of PDP can be found in chapter A.2 of appendix. Slim facades between the components of PDP lead to a loosely coupled components. These facades are shown in picture Network Access Authority Architecture Overview NAA In picture 4.3 the most important source files and classes of NAA are shown. Below the dotted line the files belonging to the EAP-TNC-Modul (from FreeRadius in C) are shown, above the dotted line the C++ classes from the Shared Object are shown. 23

24 4 Policy Decision Point for Linux Figure 4.1: Overall architecture of PDP 24

25 4.2 Network Access Authority Figure 4.2: Fascades between components inside PDP 25

26 4 Policy Decision Point for Linux Figure 4.3: Static architecture of NAA component Source files from FreeRadius These are the tasks of the source files from FreeRadius extension: rlm eap tnc is the external access point for the EAP modul. tnc connect includes methods that establish direct connection to the functionality of TNC Shared Object. eap tnc cares of EAP-TNC specific tasks (analyse and create EAP-TNC messages). NAA classes of Shared Object Extended NAA functionality is implemented inside the Shared Object: TNCSBind is a C interface for the FreeRadius module. ConnectionManager administrates all connections to PDP that are active. Additionally, ConnectionManager loads IMVs using LinuxIMVCollector and informs them of new or finished connections via IMVCommunicator. Naa2Tncs exists for every active connection once and builds the bridge between NAA tasks (like fragmentation of TNCCS messages) and the pure TNC Server (via TncsFlowControl). 26

27 4.3 TNC Server FragmentationManager executes fragmentation and defragmentation initiated by Naa2Tncs Flow inside NAA The sequence diagram in picture 4.4 shows roughly how the presented functions and classes interact with each other. 4.3 TNC Server Architecture Overview TNCS The architecture of TNC Server with the most important classes is shown in picture 4.5. The classes are ordered vertically: The classes below the dotted line handle the correct flow and state of TNC Server. TncsFlowControl is the central class that takes TNCCS messages from Naa2Tncs and initiates the processing of the message. TNCCSMsgMaster creates and analyses TNCCS messages. ImcImvMessageRepository stores IMC-IMV messages that come from IMCs remotely and from IMVs locally. IMUnitRepository stores access information to each registered IMV component. LinuxConfigReader reads configuration file tnc_config as described in Linux Binding of IF-IMV. Recommender stores recommendations given by IMV components and generates final recommendations based on a security policy. Classes above the dotted line communicate directly with IMV components: LinuxIMVCollector loads IMV components at server start. IMVCommunicator communicates with IMVs via IF-IMV. tnc imv fascade offers together with tnc_imv_linuxbinding the TNCS functions from IF-IMV to IMVs. 27

28 4 Policy Decision Point for Linux Figure 4.4: Flows inside NAA after having received a RADIUS message 28

29 4.3 TNC Server Flow inside TNC Server Figure 4.5: Static architecture of TNCS Picture 4.6 shows the flow inside TNC Server (diagram can be connected to diagram 4.4 on page 28 at number 15) End of Handshake and Policy Management End of Handshake In our implementation a handshake ends under one of the following conditions: All IMVs already gave a recommendation OR no IMV (although asked) sends new IMC-IMV messages to TNC Server OR a configurable number of batches has been reached. Policy Management The final recommendation is based on a simple security policy in this implementation. There are 6 different settings that can be chosen. After having collected recommendations from all IMVs the TNC Server walks through one of the six flowcharts (see picture 4.7) and so generates a final decision. Which diagram to use can be configured in /etc/tnc/tncs_fhh.config. 29

30 4 Policy Decision Point for Linux Figure 4.6: Flow inside TNCS between Receiving and Sending a TNCCS message 30

31 4.3 TNC Server Figure 4.7: All available policy walk-throughs 31

32 4 Policy Decision Point for Linux 4.4 Development Development Environment We used Eclipse for Linux as development environment. As for the AR in Windows we used the Eclipse plugin CDT SDK here in version Development support for the build of TNCS-SO The development and build of the TNCS Shared Object is done gaining full support of CDT. We created a Managed Make C++ Project and built the TNCS SO completely out of Eclipse. The mandatory Eclipse settings are listed in appendix B.2. At the end of this build process part a Shared Object libtncs.so has been generated that will be included in the complete build of PDP Development of EAP-TNC Module This part of application cannot be built out of Eclipse because it is part of the Free- Radius application that is delivered with a complex build process. So we wrote the code in a text editor and copied the created and modified files into the FreeRadius distribution. 4.5 Development of EAP-TNC Module from FreeRadius Configuration of FreeRadius We can use FreeRadius with its default configuration. Only one adjustment is to be done: In /usr/local/etc/raddb/clients.conf the PEP is registered as client (see example configuration in Listing 4.1). client { secret = mypassword shortname = TNC-PEP nastype = other } Listing 4.1: PEP entry in clients.conf 32

33 4.5 Development of EAP-TNC Module from FreeRadius Extension of EAP Module Modifications in configuration files of EAP Module The configuration files of EAP module are modified as following (compare [Rag05]): In /usr/local/etc/raddb/eap.conf a new entry for EAP-TNC is registered in Supported EAP-types and referenced as Default EAP type (see Listing 4.2). eap{ default_eap_type = tnc... #Supported EAP-types tnc{ }... } Listing 4.2: Settings in eap.conf Changes in general EAP Module code The EAP module framework maps the EAP types and EAP type numbers to the responsible module. Therefore in <FREERADIUS>/src/modules/rlm_eap/libeap/ eapcommon.c in array eap_types tnc has to be entered at position 38 (EAP- TNC is assigned to EAP-Type 38) (see Listing 4.3). static const char *eap_types[]={... "37", "tnc", "39" }; Listing 4.3: EAP-TNC in eapcommon.c A similiar addition has to be undertaken in eap_types.h (see Listing 4.4). #define PW_EAP_MAX_TYPES 39 #define PW_EAP_TNC 38 Listing 4.4: EAP-TNC in eap types.h With these additions the EAP module now forwards all EAP messages to the new EAP submodule EAP-TNC presented in the next section Generation of EAP submodule EAP-TNC The easiest way to create the new EAP-TNC module rlm_eap_tnc was to copy the existing module rlm_eap_md5 and change everywhere md5 to tnc so 33

34 4 Policy Decision Point for Linux that we have a module fully functional. RADIUS>/src/modules/rlm_eap/types. The modules can be found in <FREE- We implemented the mandatory functions tnc_initiate and tnc_authenticate in file rlm_eap_tnc.c and registered them in the struct rlm_eap_tnc (see Listing 4.5). static int tnc_initiate(void *type_data, EAP_HANDLER *handler){... } static int tnc_authenticate(void *arg, EAP_HANDLER *handler){... } EAP_TYPE rlm_eap_tnc= { "eap_tnc", NULL, /* attach */ tnc_initiate, /* Start the initial request */ NULL, /* authorization */ tnc_authenticate, /* authentication */ NULL /* attach */ } Listing 4.5: rlm eap tnc.c Important is that these methods fill the passed EAP_HANDLER with the correct EAP Request (based on EAP-TNC) as output parameter. The TNCS-SO is accessed as usual Shared Object out of this module. VLAN Assignment We do not want to configure the VLAN assignment user-oriented as it is usually done in FreeRadius via configuration file /usr/local/etc/raddb/users (see Listing 4.6). Lumpy Auth-Type := EAP, User-Password == "mypassword" Tunnel-Type = "VLAN", Tunnel-Medium-Type = "IEEE-802", Tunnel-Private-Group-ID = 96 Listing 4.6: Configured VLAN assignment in raddb/users Instead we made the assignment programmatically based on the judgement of TNCS. 1 Listing 4.7 shows how the RADIUS attributes according to IF-PEP can be set into EAP_HANDLER. VALUE_PAIR *tunneltype = pairmake("tunnel-type", "VLAN", T_OP_SET); pairadd(&handler->request->reply->vps, tunneltype); 1 An authentication of the users does not take place. 34

35 4.6 Build of PDP VALUE_PAIR *tunnelmedium = pairmake("tunnel-medium-type", "IEEE-802", T_OP_SET); pairadd(&handler->request->reply->vps, tunnelmedium); char *vlannumber="96"; VALUE_PAIR *vlanid = pairmake("tunnel-private-group-id", vlannumber, T_OP_SET); pairadd(&handler->request->reply->vps, vlanid); Listing 4.7: Programmative VLAN assignment 4.6 Build of PDP The complete build of PDP consists of several steps: 1. TNCS-SO is built as described in the last section. 2. TNCS-SO is copied to its target position. 3. All potentially changed *.c- and *.h-files are copied to its destination in Free- Radius distribution. These are the files from the following directories: modules/rlm_eap/types/rlm_eap_tnc modules/rlm_eap/libeap 4. The EAP-TNC module, EAP Module and the whole FreeRadius distribution are compiled. 5. The generated files are copied to its target positions. The steps 2 und 3 are summarized in a script copyall, step 4 and 5 go in accordance with the FreeRadius Build process. (see Listing: 4.8). /home/tncuser/workspace/copyall && make && make install Listing 4.8: Build execution for PDP 4.7 Configuration file tncs fhh.conf To ease the configuration of PDP a configuration file tncs_fhh.conf is part of the system that is built up like a property file. You can see the structure in listing B.2 in appendix. The configuration file offers the following setting possibilities: VLAN ACCESS The VLAN ID for ARs that passed the integrity check 35

36 4 Policy Decision Point for Linux VLAN ISOLATE The VLAN ID for ARs that should be isolated BATCH COUNT Number of batches the TNCS allows before finishing the Handshake POLICY The Number of active security guide line (see chapter and comments in file) TNCS PATH Path to the TNCS-Shared Object The applicable IMVs are registered in file tnc_config according to IF-IMV, Linux Binding. 36

37 5 Client/Server-spanning concepts In order to reach reusement, simple extensibility and portability there are classes and concpts inside that are developed once and used in AR as well as in PDP. 5.1 Concepts for Platform independence Inside TNC architecture there are two areas that are platform dependent: Accessing the network Linking the IMCs/IMVs With the Factory-Pattern we achieved that these areas are implemented plattformdependent but used plattform-independent. Picture 5.1 shows how this works. So it is very simple to port the TNC Client to Linux. You only have to implement LinuxIMCCollector and LinuxNetAccessor. Figure 5.1: Plattform dependent creation with Factory-Pattern 37

38 5 Client/Server-spanning concepts 5.2 Connecting the IML Connecting the IML works very similar in TNC Client and TNC Server. Because of that we implemented the connection in shared classes as far as possible. Figure 5.2 shows all the classes that take part in this process. Figure 5.2: Classes for connecting the IML Figure 5.3 shows the flow during the communication with the components of IML at the example of TNC Client. The flow shown in picture 5.3 can also take place in TNC Server with one exception. Instead of IMCCommunicator IMVCommunicator has to be used. The mechanism shown in picture 5.4 makes possible that the right Communicator is used in a transparent way to the caller. 5.3 TNCCS Communication and Fragmentation The classes responsible for TNCCS communication (defined in IF-TNCCS) and fragmentation (defined in IF-T EAP Binding) are shown in picture TNCCS creation and analysis Figure 5.6 shows how the creation and analysis of TNCCS messages inside IEL work Fragmentation of messages FragmentationManager inside NAL is the main actor in the complex fragmentation and defragmentation process and offers a lot of methods. Figure 5.7 shows which 38

39 5.3 TNCCS Communication and Fragmentation Figure 5.3: Flow of communication between IML components and TNC Client decisions have to be made at the start of the process when a EAP-TNC message arrives. Figure 5.8 and 5.9 continue and finish this process. All these decisions can be mapped to methods of FragmentationManager. Fragmentation works similar in NAR and NAA. Inside the AR Fragmentation- Manager is controlled by NetAccessControl, inside the PDP Naa2Tncs plays this role. 39

40 5 Client/Server-spanning concepts Figure 5.4: Communication with IMCs vs. communication with IMVs Figure 5.5: Classes responsible for implementing IF-TNCCS and fragmentation 40

41 5.3 TNCCS Communication and Fragmentation Figure 5.6: Flow with focus on analysis and creation of TNCCS messages 41

42 5 Client/Server-spanning concepts Figure 5.7: Start of fragmentation process with handle of incoming acknoledgments 42

43 5.3 TNCCS Communication and Fragmentation Figure 5.8: Handle of received TNCCS-message 43

44 5 Client/Server-spanning concepts Figure 5.9: Handle of outgoing TNCCS-messages 44

45 6 Configuration of network environment Now we want to explain how to configure your switch so that it works together with our TNC implementation. We show exemplarily the settings of a HP Procurve 5348xl that we used during our development (also see [HP 05]). We assume that we use network and the IP of the switch is General 802.1x activation We activate 802.1x on the switch with the following steps: config switches to configuration mode aaa authentication portaccess eap-radius thentication defines that we want to use RADIUS for au- show auth shows the latest settings (see figure 6.1) radius host defines the IP address of the RADIUS server (our PDP) radius-server key mypassword as key when accessing the RADIUS server defines that mypassword should be used aaa port-access authenticator activates 802.1x authentication active 802.1x authentication for single ports aaa port-access authenticator A11 switches on 802.1x authentication for Port A11 VLAN setup The webconsole is the simplest way for configuring the VLANs. Via Configuration and VLAN Configuration you can watch existing and add new VLANs. You should configure these two VLANs: 45

46 6 Configuration of network environment Figure 6.1: The authentication configuration of Procurve switch VLAN ID VLAN Name Description 96 AuthZone VLAN for ARs that passed the integrity check 97 IsoZone VLAN for ARs that should be isolated after integrity check Figure 6.2 shows a complete VLAN configuration that could look like yours. Now the switch is ready for TNC. The configuration of a Cisco switch proceed similar and is explained in [Cis04]. 46

47 Figure 6.2: The complete VLAN configuration in Procurve webconsole 47

48 6 Configuration of network environment 48

49 Appendix A Design Documents A.1 Sequence diagrams 49

50 Appendix A Design Documents Figure A.1: Overall flow TNCCS and IMC communication in TNCC 50

51 A.1 Sequence diagrams Figure A.2: Initialization of TNC Client 51

52 Appendix A Design Documents A.2 Class diagrams Figure A.3: Static overall archicture of AR 52

53 A.2 Class diagrams Figure A.4: Static overall architecture of PDP 53

54 Appendix A Design Documents A.3 TNC Client Screenshots Figure A.5: TNC Client User Interface: The integrity checks has ended with Access denied 54

55 A.3 TNC Client Screenshots The in- Figure A.6: TNC Client User Interface when NDISProt is not running. tegrity check cannot be started. 55

56 Appendix A Design Documents 56

57 Appendix B Development, Installation and Configuration B.1 Development Environment in Windows The following tables and Screenshots show the settings to be done in Eclipse in order to compile and build the AR successfully. GCC C++ Compiler/Preprocessor/Defined Symbols Symbol required by GNUWIN32 wxwidgets STRICT wxwidgets WXMSW wxwidgets WINDOWS wxwidgets WXDEBUG wxwidgets The dialog Defined Symbols is shown in figure B.2. GCC C++ Compiler/Directories/Include paths Path required by <WXW>/lib/mswd wxwidgets <WXW>/build-debug/lib/wx/- wxwidgets include/msw-ansi-debug-static- 2.6 <WXW>/include wxwidgets <WXW>/contrib/include wxwidgets <WXW>/src/regex wxwidgets <WXW>/src/png wxwidgets <WXW>/src/jpeg wxwidgets <WXW>/src/zlib wxwidgets <WXW>/src/tiff wxwidgets <WXW> stands for the path to wxwidgets installation. The dialog Include paths is shown in figure B.3. 57

58 Appendix B Development, Installation and Configuration GCC C++ Compiler/Miscellaneous/Other flags Flags required by -c fmessage-length=0 -fno-rtti -fexceptions wxwidgets The dialog Other flags is shown in figure B.4. GCC C++ Linker/Libraries/Libraries Library required by TNCUtil Usage of Util-functions xerces-c27 Xerces (XML-Parsing) wx mswd core-2.6 wxwidgets wx based-2.6 wxwidgets oleaut32 wxwidgets ole32 wxwidgets uuid wxwidgets comctl32 wxwidgets GCC C++ Linker/Libraries/Library Search Path Path required by <Path to libxerces-c27.dll.a> xerces-c27 <Path to libtncutil.a> TNCUtil <WXW>/build-debug/lib wxwidgets <WXW>/contrib/lib wxwidgets The dialog according included libraries is shown in figure B.6. GCC C++ Linker/Miscellaneous/Linker flags Flag required by -mwindows wxwidgets 58

59 B.1 Development Environment in Windows Figure B.1: Overview of Compiler settings Figure B.2: Settings for Preprocessor 59

60 Appendix B Development, Installation and Configuration Figure B.3: Directories where the Compiler should search for source files Figure B.4: Other Compiler settings 60

61 B.1 Development Environment in Windows Figure B.5: Overview of Linker settings Figure B.6: Definition of included libraries 61

62 Appendix B Development, Installation and Configuration B.2 Entwicklungsumgebung unter Linux The following tables and screenshots show the mandatory settings in Eclipse for building the shared object of TNCS successfully. GCC C++ Linker/Libraries/Libraries Library required by dl dynamic loading of so-files (IMV-SO-files) TNCUtilLinux usage of util-functions xerces-c.so Xerces (XML-Parsing) GCC C++ Linker/Libraries/Library search path Path required for <Path to libxerces-c.so.a> xerces-c.so <Path to libtncutillinux.so> TNCUtilLinux The Dialog for library settings is shown in figure B.8. GCC C++ Linker/Shared Library Settings Mark set required for Shared building NAA-TNCS as Shared Object The dialog Shared Library Settings is shown in figure B.9. 62

63 B.2 Entwicklungsumgebung unter Linux Figure B.7: Overview of Linker-settings Figure B.8: Library settings of TNCS 63

64 Appendix B Development, Installation and Configuration Figure B.9: TNCS will be created as Shared Object. 64

65 B.3 Installation von NDISProt B.3 Installation von NDISProt Figure B.10: Properties of LAN connection before NDISProt installation; one click on Install starts the installation. 65

66 Appendix B Development, Installation and Configuration Figure B.11: Now we add a Protocol. Figure B.12: Because NDISProt is not visible we search for it. 66

67 B.3 Installation von NDISProt Figure B.13: After ndisprot.inf has been selected, the driver is found and selected. Figure B.14: Driver is installed and is shown in the properties dialog of LAN connection. 67

68 Appendix B Development, Installation and Configuration B.4 Build of wxwidgets Before we can use wxwidgets for developing applications it has to be built for the specific plattform. In the case of TNC Client this is the cygwin environment in Windows. After the wxwidgets distribution has been installed successfully to $WXWIN we build wxwidgets for Cygwin by executing the steps from Listing B.1 in Cygwin Bash Shell. cd $WXWIN mkdir build-debug cd build-debug../configure --with-msw --enable-debug --enable-debug_gdb --disable-shared make Listing B.1: Build of wxwidgets for Cygwin B.5 Configuration files #VLAN-Configuration VLAN_ACCESS=96 VLAN_ISOLATE=97 #Batch-Configuration BATCH_COUNT=5 #Policy-Configuration POLICY=5 #possible values: #1 (positive simple) #2 (positive unanimity) #3 (positive majority) #4 (negative simple) #5 (negative unanimity) #6 (negative majority) #TNCS-Connection (path max 200 tokens) #if no valid path is given: #default: /usr/local/lib/libtncs.so TNCS_PATH=/tmp/_master-temp/tncs/libTNCS.so Listing B.2: tncs fhh.conf 68

69 Bibliography [Cis04] Cisco Systems, Inc.: Catalyst 3550 Multilayer Switch Software Configuration Guide, Mai Cisco IOS Release 12.1(20)EA2. [Don04] Donaldson, Cameron: C++ GUI Programming on Windows 2000/XP, html Dezember Stand: 08. August [HP 05] HP Procurve Networking: Access Security Guide, Oktober ProCurve Switches E (Series 5300xl), M (Series 3400/6400cl). [IEE04] IEEE Computer Society: 802.1X - Port-Based Network Access Control, 13. Dezember IEEE Standard for Local and metropolitan area networks. [Rag05] Raghu: Rlm eap Extensible Authentication Protocol, freeradius.org/index.php/rlm_eap Dezember FreeRadius Wiki Stand: 29. Mai

70 Bibliography 70

71 List of Figures 3.1 Deployment Diagram: Overall architecture of AR Component Diagram: Fascades between components of AR Class diagram: Static architecture of NAR Class diagram: Packet generation and validation Sequence diagram: NAR during establishing of connection Sequence diagram: NAR during sending and receiving TNCCS messages Class diagram: TNC Client Sequence diagram: Flows inside TNC Client Screenshot: Build of NDISProt Screenshot: TNC Client user interface after granted access Deployment Diagramm: Overall architecture of PDP Component Diagram: Fascades inside PDP Class diagram: Static architecture of NAA Sequence diagram: Flows inside NAA Class diagram: Architecture of TNCS Sequence diagram: TNC Server between Receiving and Sending TNCCS Flussdiagramm: All available Policies Class diagram: Plattform dependent creation with Factory-Pattern Class diagram: Connecting the IML Sequence Diagram: Connecting the IML in TNCC Sequence diagram: Communication with IMCs vs. IMVs Class diagram: Implementation of IF-TNCCS Sequence Diagram: TNCCS messages Flussdiagramm: Start of fragmentation process, incoming acknoledgements Flussdiagramm: Handle of received TNCCS-message Flussdiagramm: Handle of outgoing TNCCS-messages Screenshot: Procurve console show auth Screenshot: VLAN configuration in Procurve-Webconsole A.1 Overall flow TNCCS and IMC communication in TNCC A.2 Initialization of TNC Client A.3 class diagram of AR

72 List of Figures A.4 class diagram of PDP A.5 Screenshot: TNC Client User Interface after Access denied A.6 Screenshot: TNC Client User Interface when NDISProt is not running 55 B.1 Screenshot: Eclipse Compiler Dialog for AR B.2 Screenshot: Eclipse Preprocessor Dialog for AR B.3 Screenshot: Eclipse Include Directories Dialog for AR B.4 Screenshot: Eclipse Compiler Miscellaneous Settings B.5 Screenshot: Eclipse Linker Dialog for AR B.6 Screenshot: Eclipse Linker Library Dialog for AR B.7 Screenshot: Eclipse Linker Settings Dialog for TNCS B.8 Screenshot: Eclipse Library Dialog for TNCS B.9 Screenshot: Eclipse Shared Settings Dialog for TNCS B.10 Screenshot: Properties of LAN-connection before NDISProt B.11 Screenshot: Choice of Protocol as Network component B.12 Screenshot: Search for NDISProt B.13 Screenshot: NDISProt found and selected B.14 Screenshot: NDISProt successfully installed

Trusted Network Connect (TNC)

Trusted Network Connect (TNC) Trusted Network Connect (TNC) Josef von Helden josef.vonhelden@inform.fh-hannover.de Martin Schmiedel Daniel Wuttke First European Summer School on Trusted Infrastructure Technologies September 2006 1

More information

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group TNC: Open Standards for Network Security Automation Copyright 2010 Trusted Computing Group Agenda Introduce TNC and TCG Explanation of TNC What problems does TNC solve? How does TNC solve those problems?

More information

Trusted Network Connect (TNC) 4th European Trusted Infrastructure Summer School August / September 2009

Trusted Network Connect (TNC) 4th European Trusted Infrastructure Summer School August / September 2009 Trusted Network Connect (TNC) 4th European Trusted Infrastructure Summer School August / September 2009 Josef von Helden University of Applied Sciences and Arts, Hanover josef.vonhelden@fh-hannover.de

More information

Dynamic VLAN assignment using RADIUS. Network Diagram

Dynamic VLAN assignment using RADIUS. Network Diagram Dynamic VLAN assignment using RADIUS This document describes how to dynamically assign clients to VLANs using RADIUS. This is useful is you have multiple clients using the same physical network and need

More information

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide Overview Interlink Networks Secure.XS and Cisco Wireless Deployment Guide (An AVVID certification required document) This document is intended to serve as a guideline to setup Interlink Networks Secure.XS

More information

APPLICATION NOTE No. 330181203-02

APPLICATION NOTE No. 330181203-02 APPLICATION NOTE No. 330181203-02 Date: April 2003 Author: Eli Shmulenson, ITC Tier IV Product Support Engineering Product: Avaya P330, P330-ML, C460 General: Steel-Belted Radius Server configuration for

More information

IP Routing Between VLANs

IP Routing Between VLANs hp procurve 10/100-T xl module J4820A hp procurve 10/100-T xl module J4820A hp procurve Mini-GBIC xl mo d ule J4878A module IP Routing Between VLANs This example configuration provides IP routing between

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

Trusted Network Connect (TNC)

Trusted Network Connect (TNC) Trusted Network Connect (TNC) Open Standards for Integrity-based Network Access Control and Coordinated Network Security April 2011 Trusted Computing Group 3855 SW 153rd Drive, Beaverton, OR 97006 Tel

More information

Network Access Control (NAC) and Network Security Standards

Network Access Control (NAC) and Network Security Standards Network Control (NAC) and Network Security Standards Copyright 2011 Trusted Computing Group Other names and brands are properties of their respective owners. Slide #1 Agenda Goals of NAC Standards What

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Unified Security TNC EVERYWHERE. Wireless security. Road Warrior. IT Security. IT Security. Conference Room. Surveillance.

Unified Security TNC EVERYWHERE. Wireless security. Road Warrior. IT Security. IT Security. Conference Room. Surveillance. Corporate Governance Employee Cube Road Warrior Surveillance Surveillance IT Security Data Center IT Security Conference Room Wireless security Manufacturing and Control TNC EVERYWHERE Unified Security

More information

Interoperability between Avaya IP phones and ProCurve switches

Interoperability between Avaya IP phones and ProCurve switches An HP ProCurve Networking Application Note Interoperability between Avaya IP phones and ProCurve switches Contents 1. Introduction... 3 2. Architecture... 3 3. Checking PoE compatibility... 3 4. Configuring

More information

VLANs. Application Note

VLANs. Application Note VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static

More information

FreeRADIUS server. Defining clients Access Points and RADIUS servers

FreeRADIUS server. Defining clients Access Points and RADIUS servers FreeRADIUS server Freeradius (http://www.freeradius.org) is a very powerfull/configurable and freely available opensource RADIUS server. ARNES recommends it for the organisations that connect to ARNES

More information

How to configure MAC authentication on a ProCurve switch

How to configure MAC authentication on a ProCurve switch An HP ProCurve Networking Application Note How to configure MAC authentication on a ProCurve switch Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. Configuring the ProCurve

More information

Configuring RADIUS Server Support for Switch Services

Configuring RADIUS Server Support for Switch Services 7 Configuring RADIUS Server Support for Switch Services Contents Overview...................................................... 7-2 Configuring a RADIUS Server To Specify Per-Port CoS and Rate-Limiting

More information

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console

Introduction. What is a Remote Console? What is the Server Service? A Remote Control Enabled (RCE) Console Contents Introduction... 3 What is a Remote Console?... 3 What is the Server Service?... 3 A Remote Control Enabled (RCE) Console... 3 Differences Between the Server Service and an RCE Console... 4 Configuring

More information

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server

How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server Application Note: Integrate Juniper SSL VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Table of contents... 2 Overview... 3 Architecture... 5 Configure

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network

Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network How To Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network Introduction This document describes how to create a secure LAN, using two servers and an 802.1xcompatible

More information

NETWORK ACCESS CONTROL

NETWORK ACCESS CONTROL RIVIER ACADEMIC JOURNAL, VOLUME 3, NUMBER 2, FALL 2007 NETWORK ACCESS CONTROL Arti Sood * Graduate Student, M.S. in Computer Science Program, Rivier College Abstract Computers connected to the Internet

More information

Deploying the BIG-IP System v11 with RADIUS Servers

Deploying the BIG-IP System v11 with RADIUS Servers Deployment Guide Deploying the BIG-IP System v11 with What s inside: 2 Prerequisites and configuration notes 2 Configuration example 3 Preparation Worksheet 4 Configuring the BIG-IP iapp for RADIUS 7 Next

More information

Network Security Solutions Implementing Network Access Control (NAC)

Network Security Solutions Implementing Network Access Control (NAC) Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting a network with Sophos NAC Advanced and Switches Sophos NAC Advanced is a sophisticated Network Access Control

More information

Configuring PEAP / LDAP based authentication using FreeRADIUS on Debian Sarge and Cisco AP1200, with WPA2 AES encryption

Configuring PEAP / LDAP based authentication using FreeRADIUS on Debian Sarge and Cisco AP1200, with WPA2 AES encryption Configuring PEAP / LDAP based authentication using FreeRADIUS on Debian Sarge and Cisco AP1200, with WPA2 AES encryption Ivan Klimek Computer Networks Laboratory Technical University Kosice, Slovakia http://www.cnl.tuke.sk

More information

Interoperability between Cisco Unified IP 7900 Series phones and ProCurve switches

Interoperability between Cisco Unified IP 7900 Series phones and ProCurve switches An HP ProCurve Networking Application Note Interoperability between Cisco Unified IP 7900 Series phones and ProCurve switches Contents 1. Introduction... 3 2. Architecture... 3 3. Checking PoE compatibility...

More information

How to Configure Web Authentication on a ProCurve Switch

How to Configure Web Authentication on a ProCurve Switch An HP ProCurve Networking Application Note How to Configure Web Authentication on a ProCurve Switch Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Configuring the ProCurve

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

The strongswan IPsec Solution

The strongswan IPsec Solution The strongswan IPsec Solution with TNC Support TCG Members Meeting June 2011 Munich Prof. Dr. Andreas Steffen Institute for Internet Technologies andapplications HSR University of Applied Sciences Rapperswil

More information

x900 Switch Access Requestor

x900 Switch Access Requestor Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting your network with Microsoft Network Access Protection (NAP) and Switches Today s networks increasingly require

More information

TCG. TCG Trusted Network Connect TNC Architecture for Interoperability. TCG PUBLISHED Copyright TCG 2004-2006

TCG. TCG Trusted Network Connect TNC Architecture for Interoperability. TCG PUBLISHED Copyright TCG 2004-2006 TCG Trusted Network Connect TNC Architecture for Interoperability Revision 2 1 May 2006 Published Contact: admin@trustedcomputinggroup.org Copyright TCG 2004-2006 TCG Copyright 2005-2006 Trusted Computing

More information

How to Configure a BYOD Environment with the Unified AP in Standalone Mode

How to Configure a BYOD Environment with the Unified AP in Standalone Mode Configuration Guide How to Configure a BYOD Environment with the Unified AP in Standalone Mode Overview This guide describes how to configure and implement BYOD environment with the D-Link Unified Access

More information

The Importance of Standards to Network Access Control

The Importance of Standards to Network Access Control White Paper The Importance of Standards to Network Access Control Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408.745.2000 1.888 JUNIPER www.juniper.net Part Number:

More information

CCT vs. CCENT Skill Set Comparison

CCT vs. CCENT Skill Set Comparison Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification

More information

Security Overview of the Integrity Virtual Machines Architecture

Security Overview of the Integrity Virtual Machines Architecture Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling

More information

EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc.

EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc. WA2088 WebSphere Application Server 8.5 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2013 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4

More information

Network Access Security It's Broke, Now What? June 15, 2010

Network Access Security It's Broke, Now What? June 15, 2010 Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's

More information

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

Using LiveAction with Cisco Secure ACS (TACACS+ Server) LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2

More information

Interoperability between Mitel IP Phones and ProCurve Switches

Interoperability between Mitel IP Phones and ProCurve Switches An HP ProCurve Networking Application Note Interoperability between Mitel IP Phones and ProCurve Switches Contents 1. Introduction... 3 2. Architecture... 3 3. Configuration... 3 3.1 Check power over Ethernet

More information

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Overview... 3 Architecture... 5 Configure Juniper IPSec on an

More information

Integration with IP Phones

Integration with IP Phones Copyright 2010 Sophos Limited. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means electronic, mechanical, photocopying,

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

On-boarding and Provisioning with Cisco Identity Services Engine

On-boarding and Provisioning with Cisco Identity Services Engine On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID

More information

ecopy ShareScan v4.3 Pre-Installation Checklist

ecopy ShareScan v4.3 Pre-Installation Checklist ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes

More information

Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab

Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Eclipse plug-in and Developer Tools Hands-on Lab Yocto Project Developer Day San Francisco, 2013 Jessica Zhang Introduction Welcome to the Yocto Project Eclipse plug-in

More information

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper

ProCurve Networking. Hardening ProCurve Switches. Technical White Paper ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3

More information

RADIUS Authentication and Accounting

RADIUS Authentication and Accounting 5 RADIUS Authentication and Accounting Contents Overview...................................................... 5-2 Terminology................................................... 5-3 Switch Operating Rules

More information

FortiGate RADIUS Single Sign-On (RSSO) with Windows Server 2008 Network Policy Server (NPS) VERSION 5.2.3

FortiGate RADIUS Single Sign-On (RSSO) with Windows Server 2008 Network Policy Server (NPS) VERSION 5.2.3 FortiGate RADIUS Single Sign-On (RSSO) with Windows Server 2008 Network Policy Server (NPS) VERSION 5.2.3 Contents Introduction... 3 Audience... 3 RADIUS Single Sign-On (RSSO) Overview... 3 What is Single

More information

Port Trunking. Contents

Port Trunking. Contents 12 Port Trunking Contents Overview..................................................... 12-2................................... 12-2 Port Connections and Configuration.......................... 12-3 Link

More information

How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1

How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1 Implementation of IEEE 802.1X in wired networks Best Practice Document Produced by UNINETT led working group on security (UFS 133) Authors: Øystein Gyland, Tom Myren, Rune Sydskjør, Gunnar Bøe March 2013

More information

Monitoring and Analyzing Switch Operation

Monitoring and Analyzing Switch Operation B Monitoring and Analyzing Switch Operation Contents Overview..................................................... B-3....................................... B-4 Menu Access To Status and Counters.........................

More information

10 STEPS TO YOUR FIRST QNX PROGRAM. QUICKSTART GUIDE Second Edition

10 STEPS TO YOUR FIRST QNX PROGRAM. QUICKSTART GUIDE Second Edition 10 STEPS TO YOUR FIRST QNX PROGRAM QUICKSTART GUIDE Second Edition QNX QUICKSTART GUIDE A guide to help you install and configure the QNX Momentics tools and the QNX Neutrino operating system, so you can

More information

Windows Host Utilities 6.0.2 Installation and Setup Guide

Windows Host Utilities 6.0.2 Installation and Setup Guide Windows Host Utilities 6.0.2 Installation and Setup Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S.A. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888) 463-8277

More information

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013 SOFTWARE ASSET MANAGEMENT Continuous Monitoring September 16, 2013 Tim McBride National Cybersecurity Center of Excellence timothy.mcbride@nist.gov David Waltermire Information Technology Laboratory david.waltermire@nist.gov

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

Cisco TrustSec How-To Guide: Guest Services

Cisco TrustSec How-To Guide: Guest Services Cisco TrustSec How-To Guide: Guest Services For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Table of Contents. Cisco Cisco VPN Client FAQ

Table of Contents. Cisco Cisco VPN Client FAQ Table of Contents Cisco VPN Client FAQ...1 Questions...1 Introduction...2 Q. Why does the VPN Client disconnect after 30 minutes? Can I extend this time period?...2 Q. I upgraded to Mac OS X 10.3 (known

More information

RWL Tech Note Wireless 802.1x Authentication with Windows NPS

RWL Tech Note Wireless 802.1x Authentication with Windows NPS Wireless 802.1x Authentication with Windows NPS Prepared by Richard Litchfield HP Networking Solution Architect Hewlett-Packard Australia Limited 410 Concord Road Rhodes NSW 2138 AUSTRALIA Date Prepared:

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database Table of Contents: INTRODUCTION:... 2 GETTING STARTED:... 3 STEP-1: INTERFACE CONFIGURATION... 4 STEP-2:

More information

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc. Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4

More information

GVRP Overview. Overview

GVRP Overview. Overview 3 GVRP Contents Overview...................................................... 3-2................................................... 3-3 General Operation........................................... 3-4

More information

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully

More information

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT John Stone CTO Cisco Systems Internetworking Ireland jstone@cisco.com 2005 Cisco Systems, Inc. All rights reserved.

More information

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S

More information

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved.

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com. 2006 Cisco Systems, Inc. All rights reserved. Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia ivk@cisco.com 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and

More information

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel

More information

Protecting and controlling Virtual LANs by Linux router-firewall

Protecting and controlling Virtual LANs by Linux router-firewall Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia

More information

Setup and Configuration Guide for Pathways Mobile Estimating

Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Setup and Configuration Guide for Pathways Mobile Estimating Copyright 2008 by CCC Information Services Inc. All rights reserved. No part of

More information

Use Cases for Target Management Eclipse DSDP-Target Management Project

Use Cases for Target Management Eclipse DSDP-Target Management Project Use Cases for Target Management Eclipse DSDP-Target Management Project Martin Oberhuber, Wind River Systems martin.oberhuber@windriver.com Version 1.1 June 22, 2005 Status: Draft Public Review Use Cases

More information

z/os Firewall Technology Overview

z/os Firewall Technology Overview z/os Firewall Technology Overview Mary Sweat E - Mail: sweatm@us.ibm.com Washington System Center OS/390 Firewall/VPN 1 Firewall Technologies Tools Included with the OS/390 Security Server Configuration

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

Port Trunking. Contents

Port Trunking. Contents 13 Port Trunking Contents Overview.................................................... 13-2 Port Trunk Features and Operation........................... 13-4 Trunk Configuration Methods................................

More information

The example in this Note uses Linux for both the access controller (RADIUS server) and the supplicant (client).

The example in this Note uses Linux for both the access controller (RADIUS server) and the supplicant (client). How To Use 802.1x Security with AT-WA7400 APs, AT-8624PoE Switches, and Linux s freeradius and Xsupplicant Introduction This How To Note details how to take advantage of 802.1x security to ensure that

More information

A practical guide to Eduroam

A practical guide to Eduroam 1 A practical guide to Eduroam Rok Papež ARNES - Academic and research network of Slovenia rok.papez@arnes.si Akyaka,Gökova, April 2007 2 Eduroam AAI 3 Eduroam wireless network components Access Points

More information

Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012

Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Troubleshooting Tools to Diagnose or Report a Problem February 23, 2012 Proprietary 2012 Media5 Corporation Scope of this Document This Technical Bulletin aims to inform the reader on the troubleshooting

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

Simple Installation of freeradius

Simple Installation of freeradius PacketShaper & freeradius created by: Rainer Bemsel Version 1.0 Dated: DEC/06/2009 This document describes the steps to install freeradius under Fedora and prepare configuration to be used to authenticate

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

TNC Endpoint Compliance and Network Access Control Profiles

TNC Endpoint Compliance and Network Access Control Profiles TNC Endpoint Compliance and Network Access Control Profiles TCG Members Meeting June 2014 Barcelona Prof. Andreas Steffen Institute for Internet Technologies andapplications HSR University of Applied Sciences

More information

Installation & Maintenance Guide

Installation & Maintenance Guide The instruction booklet is also included on the CD in Word and Acrobat formats, which may be easier to print. (If you want to install Acrobat Reader run d:\acroread\setup.exe (where d:\ is the identifier

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

Authoring for System Center 2012 Operations Manager

Authoring for System Center 2012 Operations Manager Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack

More information

VMware vcloud Air Networking Guide

VMware vcloud Air Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

VLAN for DekTec Network Adapters

VLAN for DekTec Network Adapters Application Note DT-AN-IP-2 VLAN for DekTec Network Adapters 1. Introduction VLAN (Virtual LAN) is a technology to segment a single physical network into multiple independent virtual networks. The VLANs

More information

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6) Cisco Certified Network Associate Exam Exam Number 200-120 CCNA Associated Certifications CCNA Routing and Switching Operation of IP Data Networks Operation of IP Data Networks Recognize the purpose and

More information

Site Configuration SETUP GUIDE. Windows Hosts Single Workstation Installation. May08. May 08

Site Configuration SETUP GUIDE. Windows Hosts Single Workstation Installation. May08. May 08 Site Configuration SETUP GUIDE Windows Hosts Single Workstation Installation May08 May 08 Copyright 2008 Wind River Systems, Inc. All rights reserved. No part of this publication may be reproduced or transmitted

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

YubiKey Authentication Module Design Guideline

YubiKey Authentication Module Design Guideline YubiKey Authentication Module Design Guideline Yubico Application Note Version 1.0 May 7, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Nios II Software Developer s Handbook

Nios II Software Developer s Handbook Nios II Software Developer s Handbook Nios II Software Developer s Handbook 101 Innovation Drive San Jose, CA 95134 www.altera.com NII5V2-13.1 2014 Altera Corporation. All rights reserved. ALTERA, ARRIA,

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Microsoft Windows Server System White Paper

Microsoft Windows Server System White Paper Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta

More information

Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents

Sample. Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager. Contents Contents 4 Configuring the RADIUS Server Integrated with ProCurve Identity Driven Manager Contents Overview...................................................... 4-3 RADIUS Overview...........................................

More information

How to simulate network devices using the Verax SNMP Simulator (Linux/Windows)

How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) How to simulate network devices using the Verax SNMP Simulator (Linux/Windows) Table of contents Abstract... 3 1. Verax SNMP Simulator installation... 4 2. Extracting SNMP record files from a physical

More information

1.6 HOW-TO GUIDELINES

1.6 HOW-TO GUIDELINES Version 1.6 HOW-TO GUIDELINES Setting Up a RADIUS Server Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: info@stonesoft.com Copyright

More information