UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT



Similar documents
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Network Access Security It's Broke, Now What? June 15, 2010

How To Use Cisco Identity Based Networking Services (Ibns)

Using IEEE 802.1x to Enhance Network Security

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

VLANs. Application Note

Network Access Control ProCurve and Microsoft NAP Integration

Cisco Secure Access Control Server 4.2 for Windows

CTS2134 Introduction to Networking. Module Network Security

Network Security Solutions Implementing Network Access Control (NAC)

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Cisco Virtual Office Express

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

On-boarding and Provisioning with Cisco Identity Services Engine

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Interoperability between Avaya IP phones and ProCurve switches

Network Virtualization Network Admission Control Deployment Guide

Websense Support Webinar: Questions and Answers

Integration with IP Phones

Abstract. Avaya Solution & Interoperability Test Lab

ClearPass Policy manager Cisco Switch Setup with CPPM. Technical Note

Secure Networks for Process Control

Policy Management: The Avenda Approach To An Essential Network Service

This chapter describes how to set up and manage VPN service in Mac OS X Server.

TABLE OF CONTENTS NETWORK SECURITY 1...1

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Cisco Virtual Office Flexibility and Productivity for the Remote Workforce

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Using Cisco UC320W with Windows Small Business Server

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Network Security 1 Module 4 Trust and Identity Technology

TrustSec How-To Guide: On-boarding and Provisioning

Best Practices for Outdoor Wireless Security

MS Series: VolP Deployment Guide

Step-by-Step Secure Wireless for Home / Small Office and Small Organizations

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

Security. AAA Identity Management. Premdeep Banga, CCIE # Cisco Press. Vivek Santuka, CCIE # Brandon J. Carroll, CCIE #23837

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published:

CCIE Security Written Exam ( ) version 4.0

Cisco TrustSec How-To Guide: Guest Services

Lucent VPN Firewall Security in x Wireless Networks

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Lab Configuring Access Policies and DMZ Settings

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Implementing Security for Wireless Networks

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Abstract. Avaya Solution & Interoperability Test Lab

Port-Based Authentication

End Point Security & Network Access Control

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

Evolving Network Security with the Alcatel-Lucent Access Guardian

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

Interoperability between Cisco Unified IP 7900 Series phones and ProCurve switches

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Interlink Networks Secure.XS and Cisco Wireless Deployment Guide

NAC Guest. Lab Exercises

Ten top problems network techs encounter

Particularities of security design for wireless networks in small and medium business (SMB)

Recommended IP Telephony Architecture

Using a VPN with Niagara Systems. v0.3 6, July 2013

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

SNRS. Securing Networks with Cisco Routers and Switches. Length 5 days. Format Lecture/lab

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

Citrix Access on SonicWALL SSL VPN

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

Juniper Networks EX Series Ethernet Switches/ Cisco VoIP Interoperability Test Results. September 25, 2009

What information will you find in this document?

VLAN 802.1Q. 1. VLAN Overview. 1. VLAN Overview. 2. VLAN Trunk. 3. Why use VLANs? 4. LAN to LAN communication. 5. Management port

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Security Technology: Firewalls and VPNs

TotalCloud Phone System

Microsoft Windows Server System White Paper

Configure A VoIP Network

Configuring Wired 802.1x Authentication on Windows Server 2012

How To Configure Voice Vlan On An Ip Phone

Cisco RV 120W Wireless-N VPN Firewall

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Dynamic VLAN assignment using RADIUS. Network Diagram

Cisco Trust and Identity Management Solutions

Interconnecting Cisco Network Devices 1 Course, Class Outline

NETWORK ACCESS CONTROL

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.

Juniper Networks Unified Access Control (UAC) and EX-Series Switches

Step-by-Step Configuration

Lab PC Network TCP/IP Configuration

CCNA Cisco Associate- Level Certifications

Cisco TrustSec Solution Overview

Transcription:

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT John Stone CTO Cisco Systems Internetworking Ireland jstone@cisco.com 2005 Cisco Systems, Inc. All rights reserved. 1

Overview and Agenda Looking at the Concepts of Identity and Authentication Applying the Concepts to Network Access Control Identity-Based Integration Issues, Authorization and Policy Enforcement Operating System Implementations and Supplicants in Different Environments 2

THREAT MODEL OVERVIEW 2005 Cisco Systems, Inc. All rights reserved. 3

The Evolution of Security Today Network-Embedded Security Identity-Based Network Services IBNS Network Admission Control NAC Last 3 Years Integrated Security (Security Integrated Throughout the Network) 3 5 Years Ago Point Security Technologies (FW, VPN, IDS, Authentication) 10 Years Ago Open Internet 4

What Is Identity-Based Network Services? IBNS!= IEEE 802.1x IBNS is a superset of IEEE 802.1x functionality IBNS is a systems framework for delivering LAN authentication, of which, a part of is using 802.1x Other enhancements and technologies complement 802.1x to form IBNS 5

Concepts of IBNS in Action Authorized User Identity based Authentication Valid Credentials Corporate Network Invalid/No Credentials X No Access Corporate Resources Unauthorized External Wireless User 6

Three Simple Theories of IBNS Keep the outsiders out Too easy for an unsecured individual to gain physical and logical access to a network Keep the insiders honest A network port is either enabled or disabled; what can users do when they get network access? Increase network visibility (real-time and logged) Dynamic configuration (DHCP) is plug and play; what accountability does an Enterprise have for who you are doing business with? 7

BASIC IDENTITY CONCEPTS SEC-2005 11299_05_2005_c2 2005 Cisco Systems, Inc. All rights reserved. 8

Basic Identity Concepts What is an identity? An indicator of a client in a trusted domain; typically used as a pointer to a set of rights or permissions; allows us to differentiate between clients What does it look like? Can look like anything: jafrazie@cisco.com Jason Frazier 00-0c-14-a4-9d-33 How do we use identities? Used to provide authorizations rights to services within a domain; services are arbitrary and can happen at any layer of the OSI model 9

Identity Everywhere? SSL, TLS 802.1x Application Session Network Link PHY Windows Networking (SMB), Kerberos Gateways, X-Auth, Firewalls, Lock and Key Access Control Locks, RFID Badge Physical access control locks, RFID proximity badge Link 802.1x Network gateways, x-auth, firewalls, lock and key Session identity SSL, TLS Application identity Windows networking, Kerberos 10

AUTHENTICATION OF IDENTITIES SEC-2005 11299_05_2005_c2 2005 Cisco Systems, Inc. All rights reserved. 11

What Is Authentication? The process of establishing and confirming the identity of a client requesting services Authentication is only useful if used to establish corresponding authorization Model is very common in everyday scenarios I d Like to Withdraw $200.00 Please. Do You Have Identification? Yes, I Do. Here It Is. Thank You. Here s Your Money. An Authentication System Is Only as Strong as the Method of Verification Used 12

Some Important Points on Authentication The process of authentication is used to verify a claimed identity An identity is only useful as a pointer to an applicable policy and for accounting Without authorization or associated policies, authentication alone is pretty meaningless An authentication system is only as strong as the method of verification used 13

Why Do We Care? Because differentiation of services and rights control is critical in network environments Not everyone has the same privileges; not all resources or information have the same level of confidentiality The concept of being able to differentiate services amongst groups or individuals If everyone had the same rights, then we wouldn t need authorization 14

AN OPERATIONAL OVERVIEW OF NETWORK AUTHENTICATION SEC-2005 11299_05_2005_c2 2005 Cisco Systems, Inc. All rights reserved. 15

Port-Based Network Authentication A client (a user or a device) requests a service in this case access to the network Verify the client s claim of identity authentication Grant or deny the services as per the policy authorization Reference the configured policies for the requesting client 16

Applying the Authentication Model to the Network I d Like to Connect to the Network. Do You Have Identification? Yes, I Do. Here It Is. Thank You. Here You Go. 17

PROTOCOLS AND MECHANISMS 2005 Cisco Systems, Inc. All rights reserved. 18

Protocol Options Extensible Authentication Protocol (EAP-RFC 3748) IEEE 802.1x framework Use of RADIUS 19

Some IEEE Terminology IEEE Terms Normal People Terms Supplicant Client Authenticator Network Access Device Authentication Server AAA/RADIUS Server 20

802.1x Port Access Control Model Authenticator Switch Router WLAN AP Identity Store/Management MS AD LDAP NDS ODBC Request for Service (Connectivity) Backend Authentication Support Identity Store Integration Supplicant Desktop/laptop IP phone WLAN AP Switch Authentication Server IAS ACS Any IETF RADIUS server 21

INTEGRATION, AUTHORIZATION, AND POLICY ENFORCEMENT SEC-2005 11299_05_2005_c2 2005 Cisco Systems, Inc. All rights reserved. 22

IBNS Feature Support for Integration and Authorization Basic IEEE 802.1X support IBNS: some extensions to 802.1x 802.1X with Dynamic VLANs Soon 802.1x with Private VLANs 802.1X with VVID (IP Telephony) 802.1X Guest VLANs 802.1x with ACLs 802/1x with RADIUS Accounting 802.1x with QoS Profile 802.1x with Wake on LAN Enhanced admissions control Greater flexibility and mobility for a stratified user community Enhanced user productivity Lowered operational expenses Additional security with converged VoIP networks Secure Mobility and Workforce Optimization = Enhanced Productivity Reduced OpEx for IT with Less Work for Adds/Moves/Changes Remove Barriers to Deployment 23

Integration Integration is key to making 802.1x and IBNS deployable How do you deal with devices that cannot speak 802.1x? How does voice interoperate with port-based access control? How do you support PC applications like remote wakeup/wake-on-lan? How do you provide network visibility for authenticated identities? 24

802.1x with VLAN Assignment AV Pairs Used All Are IETF Standard: [64] Tunnel-type VLAN (13) [65] Tunnel-medium-type 802 (6) [81] Tunnel-private-group-ID <VLAN name> Marketing CatOS RADIUS attributes received in CatOS are automatically implemented if 802.1x is enabled. IOS aaa authorization network default group radius VLAN name must match switch configuration Mismatch results in authorization failure 25

802.1x with ACL Assignment Vendor-specific attributes used for RADIUS [026] vendor specific [009] vendor ID for Cisco [001] refers to the VSA number Attribute used for predefined ACLs [11] filter ID permit ip 10.1.1.0 0.0.0.255 10.2.2.0 0.0.0.255 deny ip 10.1.1.0 0.0.0.255 10.3.3.0 0.0.255 permit ip any 209.165.201.5 CatOS RADIUS attributes received in CatOS are automatically implemented if 802.1x is enabled. IOS aaa authorization network default group radius 26

802.1x with ACLs 27

802.1x with QoS Policy Vendor-specific attributes used for RADIUS [026] vendor specific [009] vendor ID for Cisco [001] refers to the VSA number set qos acl ip ACL dscp 7 any CatOS RADIUS attributes received in CatOS are automatically implemented if 802.1x is enabled. IOS aaa authorization network default group radius Use to enable the automatic QoS provisioning of users In this example, RADIUS will send down a QoSPACL name along with an accept packet Policy converted into ACEs and installed on this switch 28

802.1x with QoS Policy 29

OPERATING SYSTEM IMPLEMENTATIONS SUPPLICANTS IN DIFFERENT ENVIRONMENTS SEC-2005 11299_05_2005_c2 2005 Cisco Systems, Inc. All rights reserved. 30

Microsoft and Machine Authentication What is machine authentication? The ability of a Windows workstation to authenticate under its own identity, independent of the requirement for an interactive user session What is it used for? Machine authentication is used at boot time by Windows OSes to authenticate and communicate with Windows domain controllers in order to pull down machine group policies Why do we care? Pre-802.1x this worked under the assumption that network connectivity was a given; post-802.1x the blocking of network access prior to 802.1x authentication breaks the machine-based group policy model UNLESS the machine can authenticate using its own identity in 802.1x 31

Windows Login Procedure User Authentication Power Up Machine Authentication Power Up Load NDIS Drivers Load NDIS drivers DHCP 802.1x Machine Auth Setup Secure Channel to DC DHCP Update GPOs Setup Secure Channel to DC Apply Computer GPOs Update GPOs Present GINA * No Connectivity to Domain Controller Until User Logs In * 802.1x Early in Boot Process Apply Compute r GPOs Windows Domain Auth Present GINA 802.1x User Auth Windows Domain Auth User + Machine Authentication Power Up Load NDIS Drivers 802.1x Machine Auth DHCP Setup Secure Channel to DC Update GPOs Apply Computer GPOs Present GINA Windows Domain Auth 802.1x User Auth DHCP * Users Can Be Individually Authenticated Network Connectivity Point of 802.1x Authorization 32

Microsoft Issues with DHCP DHCP Is a Parallel Event, Independent of 802.1x Authentication With wired interfaces a successful 802.1x authentication DOES NOT force an DHCP address discovery (no mediaconnect signal) This produces a problem if not properly planned DHCP starts once interface comes up If 802.1x authentication takes too long, DHCP may time out 802.1x Auth Variable Timeout DHCP Timeout at 62 Seconds Power Up Load NDIS Drivers DHCP Setup Secure Channel to DC Present GINA (Ctrl- Alt-Del) Login 33

Microsoft Fixes Windows XP: Install Service Pack 1a + KB 826942 Windows 2000: Install Service Pack 4 Supplicant Authenticator Authentication Server Login Req. Send Credentials Accept Forward Credentials to ACS Server Auth Successful (EAP-Success) ICMP Echo (x3) for Default GW from Old IP as Soon as EAP-Success Frame Is Rcvd VLAN Assignment DHCP-Request (D=255.255.255.255) (After Pings have Gone Unanswered) DHCP-NAK (Wrong Subnet) DHCP-Discover (D=255.255.255.255) At this Point, DHCP Proceeds Normally 34

802.1x Supplicant Support 802.1x requires client side code (supplicant code) Growing support for supplicants in the industry Microsoft native in Win2K, XP, and 2003 Funk Software support for WinNT, Win2k, WinXP, PocketPC (Windows mobile) Meetinghouse support for WinNT, Win2K, WinXP, Win98, WinME, Solaris, Red Hat Linux Opensource Open1x xsupplicant for UNIX/Linux platforms Apple native OS X support Cisco WLAN support in ACU 35

802.1x Supplicant Support What Endpoints Are Covered? Windows XP Yes Windows 2000 Yes Linux Yes HP-UX Yes Solaris Yes HP printers Yes Windows ME Limited Windows 98 Limited Windows NT4 Limited Apple OS X 10.3 Yes Third party: Meeting House Now Third party: Funk Software Now Windows Solaris IP Phones 7920 WLAN APs HP Jet Direct Apple Pocket PC 36

802.1x Supplicants: MAC OS X NOTE: Apple machines can be added to Windows domains, so PEAP can be accomplished Apple supplicant info (for further information) http://www.apple.com/macosx/features/networkin http://docs.info.apple.com/article.html?artnum=151759 37

Trust and Identity Solutions 802.1x Control Who/What Has Access Authorization Based on Identity and Host Posture???? 38

Summary Identity for both man and machine is a reality Authentication for both is deployable today Policy Enforcement can be implemented at a network level Posture with SW Revision checking available via NAC What does this mean???? You can move to the monitoring of the Users, their application traffic flows Invalid access attempts etc. 39

Q and A 2005 Cisco Systems, Inc. All rights reserved. 40

2005 Cisco Systems, Inc. All rights reserved. 41