Cisco TrustSec 3.0 How-To Guide: Introduction to MACSec and NDAC
|
|
|
- Penelope Hubbard
- 10 years ago
- Views:
Transcription
1 Guide Cisco TrustSec 3.0 How-To Guide: Introduction to MACSec and NDAC Guide 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21
2 Contents Introduction... 3 MACsec... 4 Downlink MACsec... 4 ISE Configuration... 7 Uplink MACsec... 7 Configuring Uplink MACsec... 8 Network Device Admission Control Creating an NDAC Domain Configuring Seed Devices Adding Non-Seed Switches Configuring the Switch Interfaces for Both Seed and Non-Seed Devices MACsec Sequence in an NDAC Domain Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 21
3 Introduction When Wi-Fi was first introduced into the consumer and corporate space, security concerns were raised around sensitive data being transmitted through the air, without any level of confidentiality. The initial solution was Wired Equivalency Protection (WEP). While not very secure, WEP provided an extra level of protection designed to bring wireless connections to the same security level as wired networks. Wireless networks quickly became more secure than wired networks, with solutions like 802.1X authentication and enhancements to encryption and keying mechanisms, such as Wi-Fi Protected Access (WPA/WPA2) using AES encryption. This gave wireless networks full encryption mechanisms to provide the confidentiality and integrity of data traversing the Layer 2 hop from the endpoint to the network infrastructure, in addition to the strong identity capabilities of 802.1X. Next, wireless equivalency was needed for wired networks so that they could provide equivalent confidentiality and integrity. One approach that was considered was using end-to-end IPSec, encrypting entire communications from end to end. However, QoS cannot be provided when a packet s contents are not visible: It wasn t possible to ensure security while encrypting both good and bad traffic across the network. The way to provide wireless equivalency - and a viable alternative to end-to-end IPSec - was to layer on the confidentiality and integrity using IEEE 802.1AE (MACsec). MACsec provides Layer 2 encryption on the LAN between endpoints and the switch as well as between the switches themselves (Figure 1). Figure 1. MACsec Layer-2 Hop-by-Hop Encryption 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 21
4 MACsec MACsec provides Layer 2 encryption on the LAN. It also encapsulates and protects the metadata field that carries the Security Group TAG (SGT), as described in the Cisco TrustSec How-To Guide. Currently, two keying mechanisms are available: Security Association Protocol (SAP) and MAC Security Key Agreement (MKA). SAP is a proprietary Cisco keying protocol used between Cisco switches. MKA will be the industry standard, and is currently used between endpoints and Cisco switches. Both use 128-bit AES-GCM (Galois/Counter Mode) symmetric encryption, which is capable of line-rate encryption and decryption for both 1 GB and 10 GB Ethernet interfaces, and provides replay attack protection of every frame. Downlink MACsec Downlink MACsec is the term used to describe the encrypted link between an endpoint and the switch. The encryption between the endpoint and the switch is handled by the MKA keying protocol. This requires a MACseccapable switch (such as a Cisco Catalyst 3750-X Series switch) and a MACsec-capable supplicant on the endpoint (such as the Cisco AnyConnect Network Access Manager). The encryption on the endpoint may be handled in hardware (if the endpoint possesses the correct hardware) or in software using the main CPU for the encryption and decryption. The Cisco switch has the ability to force encryption, make encryption optional, or force non-encryption; this setting may be configured manually per port (not very common) or dynamically as an authorization result from the Cisco Identity Services Engine (ISE) (much more common). If ISE returns an encryption policy with the authorization result, the policy issued by ISE overrides anything set using the switch CLI. Figure 2 shows the MACsec policy within an authorization profile on ISE. Under Attributes Details, you can see that the attribute sent to the switch is cisco-av-pair=subscriber:linksec-policy, followed by the policy itself. The choices are Must-Secure, Should-Secure, and Must-Not-Secure. Example 1 shows these options on the switch CLI, and Table 1 displays the resulting policy based on the Supplicant Policy and Switch Policy. Figure 2. Authorization Profile 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 21
5 Example 1 MACsec Policy Switch CLI C3750X(config-if)#authentication linksec policy? must-not-secure Never secure sessions must-secure Always secure sessions should-secure OPTIONALLY secure sessions Table 1. Resulting MACsec Policies Supplicant Policy Switch Policy Resulting Policy Client Supplicant Not Capable of MACsec Not MACsec-Capable Not MACsec-Capable Must-Not-Secure Should-Secure Must-Secure Not Secured Blocked or Fallback Client Supplicant Configured as Must-Not-Secure Not MACsec-Capable Must-Not-Secure Must-Not-Secure Should-Secure Must-Secure Not Secured Blocked or Fallback Client Supplicant Configured as Should-Secure Should-Secure Not MACsec-Capable Must-Not-Secure Should-Secure Must-Secure Not Secured Secured Client Supplicant Configured as Must-Secure Must-Secure Not MACsec-Capable Must-Not-Secure Should-Secure Must-Secure Blocked Secured If the authentication server does not return the appropriate attribute value pair to set the policy, the switch uses the configured policy on the port. If no policy is specified in the switch configuration, the switch reverts to the default policy of Should-Secure. Switch Configuration Modes Some of the configurations on the switch interface have implications for a MACsec deployment; an example is the authentication host mode. The host mode determines the number of endpoints that may be connected to a single switch interface. Single-Host Mode: MACsec is fully supported in single-host mode. In this mode, only a single MAC or IP address can be authenticated and secured with MACsec. If a different MAC address is detected on the port after an endpoint has authenticated, a security violation will be triggered on the port Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 21
6 Multi-Domain Authentication (MDA) Mode: In this mode, one endpoint may be on the data domain and another endpoint may be on the voice domain. MACsec is fully supported in MDA mode. If both endpoints are MACsec-capable, each will be secured by its own independent MACsec session. If only one endpoint is MACsec-capable, that endpoint can be secured while the other endpoint sends traffic in the clear. Multi-Authentication Mode: In this mode, a virtually unlimited number of endpoints may be authenticated to a single switch port. MACsec is not supported in this mode. Multi-Host Mode: While MACsec usage in this mode is technically possible, it is not recommended. In Multi-Host Mode, the first endpoint on the port authenticates, and then any additional endpoints will be permitted onto the network via the first authorization. MACsec would work with the first connected host, but no other endpoint s traffic would actually pass, since it would not be encrypted traffic. Example 2 shows a switch interface configuration for MACsec-enabled endpoints. The example is using the default MACsec policy of Should-Secure ; therefore, the default setting is displayed. Example 2 Switch Interface Configuration for MACsec interface X switchport access vlan 10 switchport mode access switchport voice vlan 99 ip access-group ACL-ALLOW in authentication event fail action next-method authentication event server dead action authorize vlan 2274 authentication event server alive action reinitialize authentication event linksec fail action next-method authentication host-mode multi-domain authentication open authentication order dot1x mab authentication priority dot1x mab authentication port-control auto authentication violation restrict macsec mka default-policy mab dot1x pae authenticator dot1x timeout tx-period 10 spanning-tree portfast end 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 21
7 ISE Configuration Downlink MACsec is configured as an attribute within the Authorization Profile (the result of an authorization). Procedure 1 Add This Result to an Authorization Profile (see Figure 3) Step 1. Navigate to Policy Policy Elements Results. Step 2. Choose Authorization Profiles. Step 3. Edit an Authorization Profile that you would like to add MACsec to (PCI was used in our example). Step 4. Under Common Tasks, scroll down to MACsec Policy. Step 5. Select must-secure, should-secure, or must-not-secure. Step 6. Click Submit or Save to save the change. Figure 3. Adding MACsec to an Authorization Profile Uplink MACsec Uplink MACsec is the term used to describe encrypting the link between the switches with 802.1AE. At the time this guide was written, the switch-to-switch encryption uses Cisco s proprietary SAP instead of MKA, which is used with the downlink MACsec. The encryption is still the same AES-GCM-128 encryption used with both uplink and downlink MACsec. Uplink MACsec may be achieved manually or dynamically. Dynamic MACsec requires 802.1X between the switches; this is covered in the Network Device Admission Control (NDAC) section. Here, we are focusing on manual mode Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 21
8 Configuring Uplink MACsec Procedure 1 Manually Configuring Uplink MACsec This method of MACsec is perfect to layer on top of the manual SGTs configured as part of the Cisco TrustSec How-To Guide. Manual configuration will encrypt the interswitch links without requiring the entire domain of trust, the way that NDAC does. It also removes the dependency on ISE for the link keying, similar to how an IPSec tunnel may be built using pre-shared keys. Let s start by re-examining the configuration of our uplink interface as we had it configured at the end of the Cisco TrustSec How-To Guide. Example 3 Uplink Configuration from the Cisco TrustSec How-To Guide C3750X# show run int Ten 1/1/1 Building configuration... Current configuration : 286 bytes! interface TenGigabitEthernet1/1/1 description Cat6K Ten1/5 no switchport ip address ip authentication mode eigrp 1 md5 ip authentication key-chain eigrp 1 EIGRP load-interval 60 cts manual policy static sgt 2 trusted no macro auto processing end With the configuration shown in Example 3, our uplink between the Cisco Catalyst 3750-X and the Cisco Catalyst 6500-Sup2T is set up to use manual keying without any encryption, but to apply SGTs to the frames. Now we will layer encryption on top of this to provide confidentiality and integrity of the SGTs and the data. Figure 4 depicts the relevant infrastructure configuration used for this example. Figure 4. Adding MACsec to the Uplink 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 21
9 Step 7. From interface configuration mode, enter cts manual. Step 8. Enable encryption with the sap pmk pairwise-master-key mode-list gcm-encrypt command. The Pairwise Master Key (PMK) should be a hexadecimal value configured to be the same on both sides of the link. This master key can be compared to a RADIUS shared-secret between a NAD and ISE, or even the preshared key used with IPSec encryption. Note: There is a difference in how the PMK is padded between Nexus and Catalyst platforms if the key is less than 64 hex digits. On a Catalyst switch, the PMK is padded with leading 0 s. On a Nexus switch, the PMK is padded with trailing zeros. To resolve this, on the Nexus add left zero padded to the command (e.g., sap pmk 26 left-zero-padded mode-list gcm-encrypt ). Note: The PMK is just one of the components used to derive the session keys that are used to encrypt traffic. Therefore it is important to keep in mind that static configuration of the PMK, as shown above, does not mean that session keys are not dynamically derived. Step 9. Add the sap pmk pairwise-master-key mode-list gcm-encrypt command to the other side of the link. Step 10. Done. Example 4 displays the example configuration steps, and Example 5 shows the final configuration for the uplink port on the Cisco Catalyst 3750-X. Example 4 Adding Encryption to the Uplink Interface C3750X#conf t Enter configuration commands, one per line. End with CNTL/Z. C3750X(config)#int Ten1/1/1 C3750X(config-if)#cts manual C3750X(config-if-cts-manual)#sap pmk 26 mode-list gcm-encrypt C3750X(config-if-cts-manual)#end C3750X# Example 5 Final Configuration for Uplink Interface C3750X#sho run int ten1/1/1 Building configuration... Current configuration : 386 bytes! interface TenGigabitEthernet1/1/1 description Cat6K Ten1/5 no switchport ip address ip authentication mode eigrp 1 md5 ip authentication key-chain eigrp 1 EIGRP load-interval 60 cts manual policy static sgt 2 trusted 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 21
10 sap pmk modelist gcm-encrypt no macro auto processing end Procedure 2 Verifying the Manual Configuration We can validate that the manual encryption on the uplink was successful with the show cts interface command, as shown in Example 6. SAP status is the status of the encryption, and we can see in the example that SAP succeeded, the pairwise cypher is using gcm-encrypt, and replay protection is enabled. Example 6 Output of show cts interface Command C3750X#show cts interface TenGigabitEthernet 1/1/1 Global Dot1x feature is Enabled Interface TenGigabitEthernet1/1/1: CTS is enabled, mode: MANUAL IFC state: OPEN Authentication Status: NOT APPLICABLE Peer identity: "unknown" Peer's advertised capabilities: "sap" Authorization Status: SUCCEEDED Peer SGT: 2 Peer SGT assignment: Trusted SAP Status: SUCCEEDED Version: 2 Configured pairwise ciphers: gcm-encrypt Replay protection: enabled Replay protection mode: STRICT Selected cipher: gcm-encrypt Propagate SGT: Enabled Cache Info: Cache applied to link : NONE Statistics: authc success: 0 authc reject: 0 authc failure: 0 authc no response: 0 authc logoff: 0 sap success: 2 sap fail: Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 10 of 21
11 authz success: 5 authz fail: 0 port auth fail: 0 L3 IPM: disabled. C3750X# As you can see from this section, little configuration is needed to use manual uplink MACsec, assuming you are using MACsec-capable hardware. However, there is still this concept of a domain of trust with the secure access solution, where we can authenticate and authorize any network devices before allowing them to participate in our infrastructure. To examine that domain of trust further, we will now discuss Network Device Admission Control (NDAC). Network Device Admission Control The Cisco Secure Unified Access architecture builds secure networks by establishing domains of trusted network devices, preventing, for example, a rogue off-the-shelf switch from connecting to your enterprise network infrastructure and possibly wreaking havoc. In order for a network device to be part of the network infrastructure and pass traffic, its peer(s) must first authenticate it. We authenticate the switch via 802.1X, much like we are authenticate the endpoints and users. However, once the device is allowed to join the network infrastructure, the communication on the links between devices is secured with MACsec. This process is known as Network Device Admission Control (NDAC). There are three main roles within NDAC: Supplicant: The role of an unauthenticated switch that is connected to a peer within the trusted domain and is attempting to join that domain. Authentication server: The server that validates the identity of the supplicant, issues the policies to allow the device onto the network, and is responsible for the encryption keys. This is the Cisco ISE server. Authenticator: An authenticated device that is already part of the trusted domain and can authenticate new peer supplicants on behalf of the authentication server Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 11 of 21
12 There is another role, known as a seed device : a device that has knowledge of at least one ISE Policy Service Node. That seed device begins or creates the NDAC trusted domain (Figure 5). When a new switch is added to the network, a switch that is already a member of the NDAC domain authenticates it. There must be at least one seed device. Figure 5. NDAC Seed Device Creating an NDAC Domain An NDAC domain is created when the first switch (the seed device) is authenticated and authorized by ISE. Note: Since the seed device begins the trusted domain, a non-seed device should be configured to perform CTS dot1x between itself and a neighbour device, not ISE. Procedure 1 Configuring ISE Network Device Group (see Figure 6) Prepare ISE for NDAC and Cisco TrustSec. From the ISE GUI: Step 1. Navigate to Administration Network Resources Network Device Groups. Step 2. Add a new Top-Level Device Group. Step 3. Name the Group and the Type TRUSTSEC. Step 4. Create a new NDG named TRUSTSEC-Device ; the type should be TRUSTSEC. Step 5. Create a new NDG named Non-TRUSTSEC-Device ; type should be TRUSTSEC. Figure 6. Cisco TrustSec Network Device Group 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 12 of 21
13 The next step is to add the switch to ISE as a NAD. This may have been completed during the Cisco TrustSec How-To Guide; however, you should go through the screens in ISE and ensure the configuration is correct. Procedure 2 Add the NAD to ISE From the ISE GUI: Step 1. Navigate to Administration Network Resources Network Devices. Step 2. If the switch is already in the device list, edit it. If not, add a new device. Step 3. Ensure the RADIUS shared secret is configured. Step 4. Set the Network Device Groups. Specifically, assign the NAD to the TRUSTSEC-Device NDG. Step 5. Enable the Advanced TrustSec Settings section of the NAD definition (see Figure 7). Step 6. You may use the device-id for TRUSTSEC Identification, or you may configure a new name here. Note: This name must match what you configure on the switch in later steps. Step 7. The device configuration deployment section is to allow ISE to push SGT-to-IP mappings to the switch. This is optional, but if you want that functionality you should add the exec and enable passwords. Step 8. Click Save. Step 9. Repeat Steps 1 through 8 for all network devices that will participate in the NDAC trusted domain. Figure 7. Advanced TrustSec Settings Once you submit a network device with the Advanced TrustSec Settings configured, the device name and password are added to a special internal identity store, known as Internal CTS Devices. This identity store is what will be used for the NDAC authentications Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 13 of 21
14 Procedure 3 Add the Cisco TrustSec AAA Servers The big difference between seed and non-seed devices is whether a device is configured with the list of AAA servers for NDAC. A new device gets the list of AAA servers from the seed device. To build the list of AAA servers to be sent to non-seed devices, add it to the SGA AAA Servers list within ISE (Figure 8). Step 1. Navigate to Administration Network Resources SGA AAA Servers Step 2. Click Add Step 3. Enter the PSN name Step 4. Enter the PSN IP Address Step 5. Click Submit Step 6. Repeat Steps 2 through 5 for all PSNs that will be involved with NDAC Figure 8. SGA AAA Servers Procedure 4 Create the Network Authorization Policy We need to create a network authorization policy for the switches to be assigned an SGT and permitted to join the NDAC trusted domain (Figure 9). The switches get assigned a SGT so that packets originating from the device are also tagged. Switch-originated traffic can also be subject to SG-ACL filtering. Step 1. Navigate to Policy Security Group Access Network Device Authorization. Step 2. Insert a rule above the default rule. Step 3. Name the rule TRUSTSEC Devices. Step 4. Set the condition to be TRUSTSEC equals TRUSTSEC-Device. This is using the network device group we created earlier in this guide. Step 5. Set the resulting Security Group to be the NADs group created in the Cisco TrustSec How-To Guide (SGT = 2). Step 6. Click Done. Step 7. Click Save Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 14 of 21
15 Figure 9. Network Device Authorization Configuring Seed Devices Now that ISE is prepared, it is time to configure the first switch of the NDAC trusted domain (the seed device). For this example, we will use the Nexus core switch as the seed device, as was shown in Figure 5. All switches may be configured as seed devices. Procedure 1 Configure a Seed Device From the switch CLI: Step 1. Enter show dot1x to see if the feature is enabled from the Introduction to Cisco TrustSec guide. If it is not, then type feature dot1x from global configuration mode. Step 2. Enter show cts and validate that the feature is enabled from the Introduction to Cisco TrustSec Guide. If not, then type feature cts from global configuration mode. Step 3. Set the CTS device-id at global configuration mode using the cts device-id device-id password password command. Note: This device-id and password must match exactly what was configured in the Network Device definition within ISE. Step 4. Add ISE to the configuration with the radius-server host ip-address key shared-secret pac. Note: The pac keyword is used to configure the Nexus switch to download a Protected Access Credential (PAC) that will be used to secure the RADIUS transactions. Step 5. Repeat Step 4 for all applicable RADIUS servers. Step 6. Create a RADIUS server group with the aaa group server radius group-name command. Step 7. Add the servers to the group with the server ip-address command. Step 8. Repeat Step 7 for all applicable servers. Step 9. Configure the RADIUS server group to use the correct VRF with the use-vrf vrf-name command. Step 10. Configure AAA authentication for 802.1x with the aaa authentication dot1x default group radiusgroup-name command. Step 11. Configure AAA accounting for 802.1x with the aaa accounting dot1x default group radius-group-name command. Step 12. Configure CTS authorization for 802.1x with the aaa authorization cts default group radius-groupname command Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 15 of 21
16 Step 13. Reenter the cts device-id device-id password password command to trigger an immediate download of the PAC file. Note: Below are examples of seed device configuration for NX-OS and IOS switches. Please note the syntax differences. Example 7 shows an example configuration on the Nexus 7000 Series core switch. Example 7 Configuring the Nexus 7000 Seed Device NX7K-CORE(config)# cts device-id NX7K-CORE password Cisco123 NX7K-CORE(config)# radius-server host key Cisco123 pac NX7K-CORE(config)# radius-server host key Cisco123 pac NX7K-CORE(config)# aaa group server radius ise NX7K-CORE(config-radius)# server NX7K-CORE(config-radius)# server NX7K-CORE(config-radius)# use-vrf default NX7K-CORE(config)# aaa authentication dot1x default group ise NX7K-CORE(config)# aaa accounting dot1x default group ise NX7K-CORE(config)# aaa authorization cts default group ise NX7K-CORE(config)# cts device-id NX7K-CORE password Cisco123 NX7K-CORE(config)# NX7K-CORE(config)# sho cts pac PAC Info : ============================== PAC Type : Trustsec AID : 01ecb dd6af9cfdc810c3d4e I-ID : NX7K-CORE AID Info : Identity Services Engine Credential Lifetime : Wed Mar 27 14:51: PAC Opaque : b ecb dd6af9cfdc810c3d4e c eb281feae c609335bb d502f300093a805f1acdce e76decbd96e98d ef414d34d5c4685d09fdec04dbfbb46ebee17174e4b75403 a10e c3c1cba408261f5862dbaee1e9c275bcc264267bdce1333baeaa370aa7e49f97e 0c353b620badb4ca00a185af6fb1b7e0c5a12407c7ecfd2284f2aa50e eeefe8ca9c4e7d NX7K-CORE(config)# NX7K-CORE(config)# sho cts environment-data CTS Environment Data ============================== Current State : CTS_ENV_DNLD_ST_ENV_DOWNLOAD_DONE Last Status : CTS_ENV_SUCCESS Local Device SGT : 0x0002 Transport Type : CTS_ENV_TRANSPORT_DIRECT Data loaded from cache : FALSE 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 16 of 21
17 Env Data Lifetime : 600 seconds after last update Last Update Time : Thu Dec 27 14:09: Server List : CTSServerList1 AID:01ecb dd6af9cfdc810c3d4e IP: Port:1812 AID:01ecb dd6af9cfdc810c3d4e IP: Port:1812 Example 8 shows an example configuration on the Catalyst 6500 Series Sup2T Distribution Switch. Example 8 Configuration of a Catalyst 6500 Seed Device C6K-DIST#cts credentials id C6K-DIST password Cisco123 CTS device ID and password have been inserted in the local keystore. Please make sure that the same ID and password are configured in the server database. C6K-DIST(config)#cts authorization list default C6K-DIST(config)#radius-server host auth-port 1812 acct-port 1813 test username radius-test pac key Cisco123 Request successfully sent to PAC Provisioning driver. C6K-DIST(config)#radius-server host auth-port 1812 acct-port 1813 test username radius-test pac key Cisco123 Request successfully sent to PAC Provisioning driver. Note: the pac keyword in the radius-server configuration is essential, to ensure the RADIUS communication between the switch and ISE is secured for NDAC. C6K-DIST(config)#radius-server vsa send authentication!(this will most likely be configured already) C6K-DIST(config)#dot1x system-auth-control!(this will most likely be configured already) Adding Non-Seed Switches A non-seed device does not have a configuration to locate the AAA servers to use with NDAC. Instead, the list is downloaded from the seed device. However, the device still needs to be added to ISE as a network device, which we did in an earlier procedure within this guide. Using non-seed devices is not required, but it is a viable option and therefore will be covered in this guide. For these examples, we will configure the Cisco Catalyst 3750X as a non-seed device; all other switches are configured as seed devices. (See Figure 10) 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 17 of 21
18 Figure 10. NDAC Trusted Domain Procedure 1 Configure a Non-Seed Device The majority of the configuration required for a non-seed device is accomplished when bootstrapping the device to work with ISE in the Bootstrap How-To Guide. Step 1. The CTS credentials will need to be entered into the device, just as with the seed device. Example 9 Cisco Catalyst 3750-X Non-Seed Device Configuration C3750X#cts credentials id C3750X password Cisco123 CTS device ID and password have been inserted in the local keystore. Please make sure that the same ID and password are configured in the server database. Step 2. The next set of commands should already be configured in the switch from the Bootstrap How-To Guide. C3750X(config)#aaa new-model C3750X(config)#aaa authentication dot1x default group radius C3750X(config)#aaa authorization network default group radius C3750X(config)#aaa accounting dot1x default start-stop group radius C3750X(config)#radius-server vsa send authentication C3750X(config)#dot1x system-auth-control 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 18 of 21
19 Configuring the Switch Interfaces for Both Seed and Non-Seed Devices Now that the global configuration is taken care of, we can enter the commands to be part of NDAC. Procedure 1 Enable NDAC on the Interface Enter the cts dot1x command on the switch interfaces that are to be trusted in NDAC. Example 10 Enabling NDAC on the Interface C3750X(config)#int Ten1/1/1 C3750X(config-if)#cts dot1x C3750X(config-if-cts-dot1x)# To verify the interface activities, use the show cts interface interface-name command. C6K-DIST#sho cts interface Global Dot1x feature is Enabled Interface TenGigabitEthernet1/5: CTS is enabled, mode: DOT1X IFC state: OPEN Authentication Status: SUCCEEDED Peer identity: "C3750X" Peer's advertised capabilities: "sap" 802.1X role: Authenticator Reauth period configured: (default) Reauth period per policy: (server configured) Reauth period applied to link: (server configured) Reauth starts in approx. 0:14:11:09 (dd:hr:mm:sec) Authorization Status: SUCCEEDED Peer SGT: 2:NADs Peer SGT assignment: Trusted SAP Status: SUCCEEDED Version: 2 Configured pairwise ciphers: gcm-encrypt null Replay protection: enabled Replay protection mode: STRICT Selected cipher: gcm-encrypt Propagate SGT: Enabled Cache Info: Cache applied to link : NONE 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 19 of 21
20 Statistics: authc success: 4890 authc reject: 40 authc failure: 11 authc no response: 0 authc logoff: 31 sap success: 2 sap fail: 0 authz success: 19 authz fail: 4871 port auth fail: 0 L3 IPM: disabled. Dot1x Info for TenGigabitEthernet1/ PAE = AUTHENTICATOR QuietPeriod = 60 ServerTimeout = 0 SuppTimeout = 30 ReAuthMax = 2 MaxReq = 2 TxPeriod = 30 MACsec Sequence in an NDAC Domain When the link between a supplicant and an authenticator first comes up, the following sequence of events typically occurs: 1. Authentication: Using NDAC, ISE authenticates a device using EAP-FAST before allowing it to join the network. During the EAP-FAST exchange, ISE creates and sends a unique PAC to the supplicant switch (the switch attempting to join the NDAC domain). That PAC contains a shared key and an encrypted token to be used for future secure communications with the authentication server. 2. Authorization: Based on the identity information of the supplicant switch, ISE provides authorization policies to each of the linked peers. The authentication server provides the identity of each peer to the other, and each peer then applies the appropriate policy for the link. 3. Security Association Protocol (SAP) negotiation: When both sides of a link support encryption, the supplicant and the authenticator negotiate the necessary parameters to establish a security association (SA), and encrypt the traffic. When all three steps are complete, the authenticator changes the state of the link from the unauthorized (blocking) state to the authorized state, and the supplicant switch becomes a member of the NDAC trusted domain Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 20 of 21
21 Printed in USA C / Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 21 of 21
Switch Configuration Required to Support Cisco ISE Functions
APPENDIXC Switch Configuration Required to Support Cisco ISE Functions To ensure Cisco ISE is able to interoperate with network switches and functions from Cisco ISE are successful across the network segment,
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
Cisco TrustSec How-To Guide: Guest Services
Cisco TrustSec How-To Guide: Guest Services For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
ClearPass Policy manager Cisco Switch Setup with CPPM. Technical Note
ClearPass Policy manager Cisco Switch Setup with CPPM Technical Note Copyright 2012 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba
TrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED
HERN WAN ENCRYPTION SOLUTIONS COMPARED KEY WORDS AND TERMS MACsec, WAN security, WAN data protection, MACsec encryption, network data protection, network data security, high-speed encryption, Senetas,
Configuring DHCP Snooping
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server
Configuring Timeout, Retransmission, and Key Values Per RADIUS Server Feature Summary The radius-server host command functions have been extended to include timeout, retransmission, and encryption key
Supported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access
Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
Configuring Wired 802.1x Authentication on Windows Server 2012
Configuring Wired 802.1x Authentication on Windows Server 2012 Johan Loos [email protected] Version 1.0 Why 802.1x Authentication? The purpose of this document is to guide you through the procedure
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
Universal NGWC/3850 Wireless Configuration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Universal NGWC/3850 Wireless Configuration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents 3850 Switch Wireless Configuration...
Implementing and Configuring Cisco Identity Services Engine SISE v1.3; 5 Days; Instructor-led
Implementing and Configuring Cisco Identity Services Engine SISE v1.3; 5 Days; Instructor-led Course Description Implementing and Configuring Cisco Identity Services Engine (SISE) v1.3 is a 5-day ILT training
Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication
Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication Requirements You can configure voice over IP (VoIP) on an EX Series switch to support IP telephones. To configure
INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505
INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this
RADIUS Authentication and Accounting
5 RADIUS Authentication and Accounting Contents Overview...................................................... 5-2 Terminology................................................... 5-3 Switch Operating Rules
Network Security and AAA
ICT Technical Update Module Network Security and AAA Prof. Dr Harsha Sirisena Electrical and Computer Engineering University of Canterbury AAA Introduction Overview A network administrator may allow remote
RADIUS Server Load Balancing
The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across RADIUS servers in a server group These servers can share the AAA transaction
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example
Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example Document ID: 69632 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
CT5760 Controller and Catalyst 3850 Switch Configuration Example
CT5760 Controller and Catalyst 3850 Switch Configuration Example Document ID: 116342 Contributed by Antoine KMEID and Serge Yasmine, Cisco TAC Engineers. Aug 13, 2013 Contents Introduction Prerequisites
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
Configuring IKEv2 Load Balancer
The IKEv2 Load Balancer feature provides support for enabling clusters of FlexVPN gateways and distributes incoming Internet Key Exchange Version 2 (IKEv2) connection requests among FlexVPN gateways. This
Lecture 3. WPA and 802.11i
Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture
Configuring Security Solutions
CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from
Configuring DHCP Snooping and IP Source Guard
CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping and IP Source Guard on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration
RADIUS Server Load Balancing
First Published: March 20, 2006 Last Updated: September 22, 2009 The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across servers in
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents...
Configuring User Authentication
Configuring User This chapter provides the following information about configuring and monitoring user authentication on Enterasys N Series, S Series, and K Series modular switches, A Series, B Series,
Passguide 500-451 35q
Passguide 500-451 35q Number: 500-451 Passing Score: 800 Time Limit: 120 min File Version: 18.5 Cisco 500-451 Cisco Unified Access Systems Engineer Exam 100% Valid in US, UK, Australia, India and Emirates.
Latest IT Exam Questions & Answers
DumpKiller Latest IT Exam Questions & Answers http://www.dumpkiller.com No help, Full refund! Exam : 210-260 Title : Implementing Cisco Network Security Vendor : Cisco Version : DEMO 1 NO.1 Which address
Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html
Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support
Chapter 7 Lab 7-1, Configuring Switches for IP Telephony Support Topology Objectives Background Configure auto QoS to support IP phones. Configure CoS override for data frames. Configure the distribution
Call Flows for Simple IP Users
This chapter provides various call flows for simple IP users. Finding Feature Information, page 1 Simple IP Unclassified MAC Authentication (MAC TAL and Web Login) Call Flows, page 1 Finding Feature Information
Huawei WLAN Authentication and Encryption
Huawei WLAN Authentication and Encryption The Huawei integrated Wireless Local Area Network (WLAN) solution can provide all-round services for municipalities at various levels and enterprises and institutions
Configuring RADIUS Servers
CHAPTER 13 This chapter describes how to enable and configure the Remote Authentication Dial-In User Service (RADIUS), that provides detailed accounting information and flexible administrative control
WLAN Security: Identifying Client and AP Security
WLAN Security: Identifying Client and AP Security 2010 Cisco Systems, Inc. All rights reserved. CUWN v7.0 4-1 Lesson Overview & Objectives Overview This lesson provides detailed discussions on the Cisco
How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1
Implementation of IEEE 802.1X in wired networks Best Practice Document Produced by UNINETT led working group on security (UFS 133) Authors: Øystein Gyland, Tom Myren, Rune Sydskjør, Gunnar Bøe March 2013
Deploying and Configuring Polycom Phones in 802.1X Environments
Deploying and Configuring Polycom Phones in 802.1X Environments This document provides system administrators with the procedures and reference information needed to successfully deploy and configure Polycom
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Recommended 802.11 Wireless Local Area Network Architecture
NATIONAL SECURITY AGENCY Ft. George G. Meade, MD I332-008R-2005 Dated: 23 September 2005 Network Hardware Analysis and Evaluation Division Systems and Network Attack Center Recommended 802.11 Wireless
Using Templates. Information About Templates. Accessing the Controller Template Launch Pad CHAPTER
CHAPTER 11 This chapter describes how to add and apply templates. Templates allow you to set fields that you can then apply to multiple devices without having to reenter the common information. This chapter
Application Note User Groups
Application Note User Groups Application Note User Groups Table of Contents Background... 3 Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 6 Configuration...
How To Use Cisco Identity Based Networking Services (Ibns)
. Data Sheet Identity-Based Networking Services Identity-Based Networking Services Overview Cisco Identity-Based Networking Services (IBNS) is an integrated solution that offers authentication, access
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
Interoperability between Avaya IP phones and ProCurve switches
An HP ProCurve Networking Application Note Interoperability between Avaya IP phones and ProCurve switches Contents 1. Introduction... 3 2. Architecture... 3 3. Checking PoE compatibility... 3 4. Configuring
Lab 7-1 Configuring Switches for IP Telephony Support
Lab 7-1 Configuring Switches for IP Telephony Support Learning Objectives Configure auto QoS to support IP phones Configure CoS override for data frames Configure the distribution layer to trust access
Firewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W
Article ID: 5037 Use Shrew Soft VPN Client to connect with IPSec VPN Server on RV130 and RV130W Objective IPSec VPN (Virtual Private Network) enables you to securely obtain remote resources by establishing
Chapter 5 Virtual Private Networking Using IPsec
Chapter 5 Virtual Private Networking Using IPsec This chapter describes how to use the IPsec virtual private networking (VPN) features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
Symantec VIP Integration with ISE
Symantec VIP Integration with ISE Table of Contents Overview... 3 Symantec VIP... 3 Cisco Identity Services Engine (ISE)... 3 Cisco Centralized Web Authentication... 4 VIP in Action... 4 ISE Configuration...
Configuring LLDP, LLDP-MED, and Location Service
27 CHAPTER Configuring LLDP, LLDP-MED, and Location Service This chapter describes how to configure the Link Layer Discovery Protocol (LLDP), LLDP Media Endpoint Discovery (LLDP-MED), and Location Service
Cisco Trust and Identity Management Solutions
CHAPTER 2 Cisco TrustSec Identity, earlier known as Cisco Identity-based Networking Services (IBNS), a part of the Cisco Trust and Identity Management Solution, is the foundation for providing access control
x900 Switch Access Requestor
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting your network with Microsoft Network Access Protection (NAP) and Switches Today s networks increasingly require
V310 Support Note Version 1.0 November, 2011
1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
Network Security Solutions Implementing Network Access Control (NAC)
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting a network with Sophos NAC Advanced and Switches Sophos NAC Advanced is a sophisticated Network Access Control
Certified Wireless Security Professional (CWSP) Course Overview
Certified Wireless Security Professional (CWSP) Course Overview This course will teach students about Legacy Security, encryption ciphers and methods, 802.11 authentication methods, dynamic encryption
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
Flow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
Understanding and Configuring 802.1X Port-Based Authentication
29 CHAPTER Understanding and Configuring 802.1X Port-Based Authentication This chapter describes how to configure IEEE 802.1X port-based authentication to prevent unauthorized client devices from gaining
Cisco Virtual Office: Secure Voice and Video
Deployment Guide Cisco Virtual Office: Secure Voice and Video The scope of this deployment guide is to provide detailed design and implementation information for deploying highly secure voice and video
Optimizing Converged Cisco Networks (ONT)
Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability Implementing WLAN QoS Objectives Describe why WLANs need to support QoS policies in enterprise networks. Explain the issues
Network Detector Setup and Configuration
339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net MODE SYST RPS MASTR STAT SPEDUPLX STACK 1 2 3 4 5 6 7 8 91 0 11 12 1X 2X 11X 12X 13 14 15 16 1718 19 20 2122 23 24 13X
Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
Deploying an SESM/SSG Solution
12 CHAPTER This section describes the attributes that control communication between components in an SESM deployment. In many cases, attributes with matching values must be set on both sides of the communication
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business
Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
Configuring Port Security
CHAPTER 62 This chapter describes how to configure the port security feature. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master List, at this URL:
Using Link Layer Discovery Protocol in Multivendor Networks
Using Link Layer Discovery Protocol in Multivendor Networks Link Layer Discovery Protocol (LLDP), standardized by the IEEE as part of 802.1ab, enables standardized discovery of nodes, which in turn facilitates
CISCO IOS NETWORK SECURITY (IINS)
CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully
Configuring QoS. Understanding QoS CHAPTER
24 CHAPTER This chapter describes how to configure quality of service (QoS) by using standard QoS commands. With QoS, you can give preferential treatment to certain types of traffic at the expense of others.
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
Configuring CSS Remote Access Methods
CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN
Lab 6.2.12a Configure Remote Access Using Cisco Easy VPN Objective Scenario Topology In this lab, the students will complete the following tasks: Enable policy lookup via authentication, authorization,
Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May 2011. 1. New Features and Enhancements. Tip of the Day
NCP Secure Entry Mac Client Major Release 2.01 Build 47 May 2011 1. New Features and Enhancements Tip of the Day A Tip of the Day field for configuration tips and application examples is incorporated in
What is VLAN Routing?
Application Note #38 February 2004 What is VLAN Routing? This Application Notes relates to the following Dell product(s): 6024 and 6024F 33xx Abstract Virtual LANs (VLANs) offer a method of dividing one
Wireless security. Any station within range of the RF receives data Two security mechanism
802.11 Security Wireless security Any station within range of the RF receives data Two security mechanism A means to decide who or what can use a WLAN authentication A means to provide privacy for the
VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
VPNs Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Policy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page
