The BYOD Wave: Policy, Security, and Wireless Infrastructure



Similar documents
Stefan Dürnberger. Consulting Systems Engineer Cisco Deutschland. sduernbe@cisco.com. Co-Author Bitkom Leitfaden BYOD

On-boarding and Provisioning with Cisco Identity Services Engine

TrustSec How-To Guide: On-boarding and Provisioning

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Integrating Cisco ISE with GO!Enterprise MDM Quick Start

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Cisco ISE and Certificates. How to Implement Cisco ISE and Server Side Certificates

BYOD: BRING YOUR OWN DEVICE.

Cisco s BYOD / Mobility

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Cisco ISE 1.2 BYOD Lab Guide

BYOD Strategy and Solutions

Bring Your Own Device

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

Managing the BYOD Evolution

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Secure Your Mobile Device Access with Cisco BYOD Solutions

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Network and Device Level Mobile Security Controls IT Considera-ons in the BYOD Era

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Bring Your Own Design: Implemen4ng BYOD Without Going Broke or Crazy. Eric Stresen- Reuter Technical Director Ruckus Wireless

Sophos Mobile Control SaaS startup guide. Product version: 6

Extending Collaboration to BYOD Devices

Ensuring the security of your mobile business intelligence

Network Virtualization Network Admission Control Deployment Guide

Cisco Mobile Collaboration Management Service

The Holistic Guide to BYOD in Your Business Jazib Frahim

802.1x in the Enterprise Network

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

Deploying iphone and ipad Security Overview

Cisco TrustSec Solution Overview

ClearPass Policy Manager

iphone in Business Security Overview

Systems Manager Cloud-Based Enterprise Mobility Management

ipad in Business Security

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

BYOD: End-to-End Security

ClearPass: Understanding BYOD and today s evolving network access security requirements

APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Vodafone Secure Device Manager Administration User Guide

ManageEngine Desktop Central. Mobile Device Management User Guide

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

Network Access Security It's Broke, Now What? June 15, 2010

Bring Your Own Device. Putting Context into Wireless Security. Glen Stacey Networking Systems Engineer

Zenprise Device Manager 6.1.5

Mobile Security: The good, the bad, the way forward

Apps. Devices. Users. Data. Deploying and managing applications across platforms is difficult.

PMDP is simple to set up, start using, and maintain

802.1X Authentication

Symantec VIP Integration with ISE

ENTERPRISE MOBILITY ENABLE YOUR NETWORKS TO SUPPORT ENTERPRISE MOBILITY

1. Introduction Activation of Mobile Device Management How Endpoint Protector MDM Works... 5

Cisco TrustSec How-To Guide: Guest Services

ios Enterprise Deployment Overview

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

ios Education Deployment Overview

Embracing Complete BYOD Security with MDM and NAC

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Securing Healthcare Data on Mobile Devices

Mobile Device Management Version 8. Last updated:

User Manual for Version Mobile Device Management (MDM) User Manual

Ben Hall Technical Pre-Sales Manager

Systems Manager Cloud Based Mobile Device Management

MDM Mobile Device Management

Cisco Validated Design

Cisco Validated Design

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

Step-by-step Guide for Configuring Cisco ACS server as the Radius with an External Windows Database

Sophos Mobile Control Installation guide. Product version: 3.5

Solutions for admission control and data loss prevention in a modern corporate network

Deploying iphone and ipad Mobile Device Management

Copyright 2013, 3CX Ltd.

POLICY SECURE FOR UNIFIED ACCESS CONTROL

ClickShare Network Integration

Workplace-as-a-Service BYOD Management

Introduction to the EIS Guide

Bring Your Own Device:

How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1

Switch Configuration Required to Support Cisco ISE Functions

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Mobile First Government

Implementing and Configuring Cisco Identity Services Engine SISE v1.3; 5 Days; Instructor-led

Embracing BYOD with MDM and NAC. Chris Isbrecht, Fiberlink Gil Friedrich, ForeScout

NetSpective Global Proxy Configuration Guide

OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.

BYOD(evice) without BYOI(nsecurity)

Cisco AnyConnect Secure Mobility Client VPN User Messages, Release 3.1

ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note

QuickStart Guide for Mobile Device Management

ipad Deployment Guide

Integrating Cisco Identity Services Engine with GO!Enterprise MDM

Transcription:

The BYOD Wave: Policy, Security, and Wireless Infrastructure Ken Kaminski Security & BYOD Technical Solutions Architect Northeast CISSP, GCIA, GCFA, GAWN, GPEN Cisco Systems. 1

1. BYOD Trends & Policy 2. BYOD Solution Building Blocks 3. BYOD Device On-Boarding 4. Wireless Infrastructure Issues 5. Mobile Device Management (MDM) Vendors 6. Radius Change of Authorization (COA) Two-way Plumbing This presentation focuses on wireless mobile smartphones and tablets in particular Apple IOS and Android Devices which are the most prevalant. 2

END USER EXPECTATIONS Over 15 Billion devices by 2015, with average worker with 3 devices New workspace: anywhere, anytime 71% Next Gen Y workforce do not obey policies 60% will download sensitive data on personal device IT TRENDS 50% workloads are virtualized to increase efficiency 2/3 of workloads will be in the cloud by 2016 71% of the world s mobile data traffic will be video in 2016 Mobile malware has doubled (2010 to 2011) REDUCE SECURITY RISK IMPROVE END USER PRODUCTIVITY INCREASE OPERATIONAL EFFICIENCIES. 4

Adoption Policy Device Ownership Support Model Support Level Data Security Many Customers Restrict, Limit, Allow, Embrace Corp, Employee, Mix, Guests IT managed, IT assisted, Self-supported Production, Guest+, Guest, Best Effort Written Policy, MDM, Virtual, Advanced Limit Basic Enhanced Advanced Environment requires tight controls Basic access for additional devices Any device, anywhere, enhanced security Any device, anywhere, anyone IT chosen devices Broader device set Wide range of devices Wide range of devices IT managed devices with mainly on-site access IT managed devices with mainly on-site access Corp and employee owned devices with full on-site and off-site access Corp and employee owned devices with full on-site and off-site access All other devices prohibited Employee owned and Guest devices with Internet only Device-side security Guest devices with Internet only Device-side security Guest/Customer devices with enhanced services Custom Native applications BYOD for Competitive advantage. 5

The Policy Server is Critical to Meeting Your Goals Who? Known users (Employees, Sales, HR) Unknown users (Guests) Where? Geographic location Department SSID / Switchport What? Device identity Device classification (profile) Device health (posture) When? Date Time Start/Stop Access How? Wired Wireless VPN Other? Custom attributes Device/User states Applications used 6. 6

Endpoint Identity AD Member Static Lists Certificate MDM Attributes Authentication MAB User/Password User Certs Location Device Type Apple ios Android Windows iphone Printer Authorization Full Access Partial Access Internet Only Deny Access. 7

BYOD Mobile Device Connectivity. 9

BYOD Smart Solution Building Blocks Collaboration Apps Lync, Jabber Workspace Management MDM & VDI Secure Mobility VPN Clients Policy Management Infrastructure Core Infrastructure Radius, Profiler, Posture, Guest, BYOD On-Boarding Wireless Infrastructure & Management. 10

Native Application Native Application Data Center Native Local data on device Maximum performance Native device experience Web Browser HTML Interface Native Application Data Center Browser Local data on device Portable to many devices Browser experience Desktop Virtualization Client Desktop Virtualization Software Native Application Data Center Virtual No local data on device Maximum security Translated experience BYO isn t about the device, its about securing data security. 11

Radius Server Guest Server Sponsored Guest Access and Guest Portal Device Profiler Network Access Control (NAC) Posture Server Windows & MacOSX clients * BYOD Device Registration Portal On-Boarding Certificate Authority (CA) Integrated Mobile Device Management Integration with Vendor. 12

Used to identify users without supplicants (Classic Guest Captive Web Portals) BYOD AD Credentials for device registration/on-boarding used vs traditional sponsored guest credentials. 14 14

User connects to Secure SSID PEAP: Username/Password Redirected to Provisioning Portal Radius URL Redirect + ACL User registers device Downloads Certificate Downloads Supplicant Config Personal Asset BYOD-Secure Access Point Wireless LAN Controller User reconnects using EAP-TLS Radius Policy Server AD/LDAP. 15

User connects to Open SSID Redirected to WebAuth portal User enters employee or guest credentials Guest signs AUP and gets Guest access Employee redirected to Provisioning Portal Radius URL Redirect + ACL Employee registers device Downloads Certificate Downloads Supplicant Config Personal Asset BYOD-Secure BYOD-Open Access Point Wireless LAN Controller Employee reconnects using EAP-TLS Radius Policy Server AD/LDAP. 16

Provisioning Apple ios Devices Uses Apple Over-the-Air (OTA) Delivery Phase 1: Authentication use user AD Credentials. Policy Server sends its certificate to device Phase 2: Certificate Enrollment Policy Server uses Simple Certificate Enrollment Protocol (SCEP) to proxy to CA Microsoft calls this Network Device Enrollment Service (NDES) Policy server tells device how to build it s Certificate Signing Request (CSR) Useful CSR: CN=username, SAN=Mac Address (helps with moving a certificate from one device to another) check MAC in Cert to radius MAC Phase 3: Service Configuration/Encrypted Profiles Configuration profile (as a Wi-Fi Profile) is an XML file. 17

Provisioning Android Devices No equivalent to Apple Over-the-Air (OTA) Delivery Need an application to do this function. Example is Cisco Network Setup Assistant Application usually hosted on Google Play need to allow access to Google Play during the device enrollment phase. This is usually done via an Access Control List included in the radius exchange The diversity of Android vendors and Service Providers and the Android Trust Model makes it difficult to host this application on the Policy Server. 18

Apple Captive Network Assistant (CNA) Problem: URL redirection on Apple devices may fail due to Apple Captive Network Assistant (CNA) Background on CNA: Apple ios feature to facilitate network access when captive portals present that requires login by automatically opening web browser in a controlled window. Feature attempts to detect the presence of captive portal by sending a web request upon WiFi connectivity to http://www.apple.com/library/test/success.html If response received, then Internet access assumed and no further interaction If no response received, Internet access is assumed to be blocked by captive portal and CNA auto-launches browser to requests portal login in a controlled window. Solutions: 1. Disable Auto-Login under WLAN settings (requires user knowledge and interaction) 2. Configure WLC to bypass CNA. 19 1

Devices owned or assigned to the employee managed by the employee Employees are able to mark any of their devices as Lost or reinstate a device Access to the device is terminated immediately 20

Expectations for the Network Is the Network Ready for Next Generation Applications? The Wireless network is no longer a network of convenience Before: 1 Employee = 1 PC Mobile BYOD clients drive advanced applications for Voice, Video, and VXI Network Infrastructure Will Have To Scale= High Bandwidth Use) Today: 1 Employee = 3 or more Devices Time to rethink the access network. 22

Access Point Spacing BYOD General Classic Data AP Spacing 5,000 sq ft BYOD AP Spacing (incl. heavier video apps) 3,500 sq ft Voice AP Spacing 2,500 sq ft Check Current Channel Utilization/Duty Cycle to get an idea of where you are at. Improving the Duty Cycle: 1. Disable Lower Data Rates 2. Beam Forming Technology 3. Spectrum Analysis built into the AP s. 23

Automatic Band Steering and Selection For 5GHZ Capable Devices BEFORE All clients crowd the 2.4GHz spectrum lowering performance AFTER 5GHz capable clients are automatically moved to cleaner 5GHz spectrum Wireless Client Performance 2.4GHz 2.4GHz 2.4GHz 5 GHz 5 GHz 2.4GHz Speed 5GHz Capable Speed 5GHz Capable Speed 2.4GHz Capable Speed 5GHz Capable Speed 5GHz Capable Speed 2.4GHz Capable. 24

Example education customer: 6,000 Endpoints (all BYOD style) 9M Auth Failures in 24 hours Many Different Failure Scenarios all related to clients dropping TLS (both PEAP & EAP-TLS). Untrusted Certificate Failures Large number of BYOD devices many models from many vendors Error: No response received during 120 seconds on last EAP message sent to the client This means the supplicant just ignored the Policy Server/WLC These devices authenticate at 10 times the rate as Windows/MACOSX desktop/laptop this has engineering implications: radius & dhcp infrastructure. 25

Client sets up a PEAP connection: MAY not trust the Certificate on the Server, like going to a https:// site where the certificate is not trusted. Is a ONE-WAY trust (Client trust server) not bi-directional trust. Client/Supplicant NAD Radius Server SSID Step 1: Initiate Request to Establish TLS Tunnel with Authenticator Step 2: Certificate sent to Supplicant Step 3: User is Prompted to Accept Certificate. After, it is Stored in WiFi Profile Step 4: TLS Tunnel is Formed, EAP happens next. 26

Client has cert saved in WiFi profile: Let s Change the Cert on the Radius Policy Server Supplicant SHOULD prompt to accept new cert, most do not. The problem: many say nothing. Client/Supplicant NAD Radius Server SSID Step 1: Due to Reauthentication, or Coming back to Campus New Connection Request Step 2: Certificate sent to Supplicant Client Rejects Cert EAP Timeout 120sec. 27

Client/Supplicant NAD Radius Policy Server SSID Step 1: Due to Reauthentication, or Coming back to Campus New Connection Request Step 2: Certificate sent to Supplicant Client Rejects Cert 30 seconds Step 1: New Connection Request Client Rejects Cert Step 2: Certificate sent to Supplicant 30 seconds First EAP Timeout 120sec 30 Seconds Later. 28

Androids (latest Android releases same behavior): CIUS (Android 2.2.2) Galaxy Tab 10.1 (4.0.4) Galaxy Tab2 7 (4.1.1) Google Nexus 7 (4.2.2) ios (ios 7.x same behavior): ipod Touch (3.1.3) - Reject Cert, Retry 30 Seconds iphone 4 (4.2.1) - Reject Cert, Retry 30 Seconds iphone 4 (6.0.0) - Dropped Network, Prompted to Accept Cert on Reconnect ipad 2 (6.0.1) - Dropped Network, Prompted to Accept Cert on Reconnect iphone 5 (6.1.0) - Dropped Network, Prompted to Accept Cert on Reconnect Windows RT All Just Accepted New Cert & Kept working. - BAD Behavior on Supplicant, Security Vulnerability Google: [M#1225844005] MS Surface Tablet - Reject Cert, Retry 30 Seconds But Prompted User. 29

TLS Certificates are used in: 1. Most EAP Methods including EAP-TLS, PEAP, EAP-FAST 2. Web Portals: Admin Portal, Guest Portal, Sponsored Guest Portal, Device On-Boarding Portal, MyDevices Portal When can this break? 1. The Certificate on the Policy Server Changes 2. The Policy Server dies and another takes over 3. A Wireless client roams to another WLC on a separate Policy Server Apple ios: device stores trusted certs in the profile. It does not follow the ios keychain where the signing root is trusted. It will not trust the new certificate even if the root CA is trusted (it is the root CA of the old cert and the new one). User must accept the new certificate in this scenario.. 30

There are three options: 1. Use a wildcard in the Subject Common Name (CN) (*policyserver.company.local) Problem: All Native Microsoft Supplicants (incl. Windows Mobile) do not support this: http://technet.microsoft.com/en-us/cc730460 Solution: Put the wildcard values in the Subject Alternative Name (SAN) extension called dnsname 2. Leave the CN Blank + Wildcard in SAN Works with most private Certificate Authorities (incl. MS AD CA) Problem: The Majority of public CAs do not allow a cert with a blank CN value. 31

3. Use a common generic hostname for all policy servers for the CN in the subject and use both this generic hostname and a wildcard value in two SAN dnsname entries: CN = aaa.policyservers.company.local SAN dnsname = aaa.policyservers.company.local SAN dnsname = *.policyservers.company.local Public CAs (examples Comodo.com and SSL.com) support these as certificate request types = unified communications certificate. 32

. 33

Filter Noise and Provide Better Feedback on Authentication Issues Filters Misconfigured Client Dynamic Detection and Suppression Accounting Flood Suppression Detect Slow Authentications Filtering at Receiving Chain Detect and reject misbehaving clients Log Filter Enhanced Handling for EAP sessions dropped by supplicant or NAS PSN Reject bad supplicant. 34

Limit the Risk From Mobile Devices New Requirement: We need to secure access to mobile devices that connect to corporate network and prevent potential loss of company data New Requirement: Require all employee mobile devices to be registered and comply with corporate policies before accessing network including: Pin Locked and Not Jail Broken Wipe Corporate Data if Policy Broken New Term: Mobile Device Management (MDM) Extends posture assessment and remediation to mobile devices. 36 36

Classification/ Profiling NETWORK CONTROL (Policy Server) Compliance Enforcement Mobile + PC Secure Network Access (Wireless, Wired, VPN) Context-Aware Access Control (Role, Location, etc.) Registration Cert + Supplicant Provisioning Inventory Management FULL MOBILITY MANAGEMENT (MDM) Enterprise Software Distribution Management (Backup, Remote Wipe, etc.) Policy Compliance Detection (Jailbreak, Pin Lock, etc.) Secure Data Containers User Managed Device Network-Based IT Control User/IT Co-Managed Device Device and Network-Based IT Control

REST API between Policy Server and MDM Console Integrate an MDM Vendor into the Policy Server (often OEM) Trend: Policy Server Vendor own MDM-Lite agent built into an existing agent. 38 3

Radius Change of Authorization (CoA) Changes traditional radius from a one-way (NAD to server only) to a two-way highway CoA allows an enforcement device (switchport, wireless controller, VPN device) to change the VLAN/ACL/Redirection for a device/user without having to start the entire process all over again. Without it: Manually remove the user from the network & then have the entire AAA process begin again. Example: disassociate wireless device & have to join wireless again. RFC 3576 and 5176. 40 4

1 Endpoint fails Posture Assessment and gets assigned to Quarantine VLAN 2 Endpoint remediates itself and is reported: Posture=Compliant Quarantine VLAN CORP VLAN 3 Policy Server issues RADIUS CoA to re-authenticate 4 Client is re-authenticated and assigned to CORP VLAN. 41 4

Radius Change of Authorization (CoA) Port mismatches RFC calls out port 3799 Different vendors implement different message-types. Only Disconnect Message & Filter-List (ACL) are mandatory (cause user experience to suffer) A shared session-id between the policy server and the Network Access Device (NAD) is required to keep sync not in the RFC URL Redirection at NAD not in RFC RFC 3576: http://tools.ietf.org/html/rfc3576 RFC 5176: http://tools.ietf.org/html/rfc5176. 42 4

Dynamic session control from a Policy server 1 Endpoint fails Posture Assessment and gets assigned to Quarantine VLAN Re-authenticate session 2 Endpoint remediates itself and is reported: Posture=Compliant Terminate session Terminate session with port bounce 3 ISE issues RADIUS CoA to re-authenticate Disable host port Session Query 4 Client is re-authenticated and assigned to CORP VLAN For Active Services For Complete Identity Service Specific Service Activate Service De-activate Service Query Quarantine VLAN CORP VLAN. 43 4