IF-MAP Overview. Jan Ursi Technical Director EMEA. 2009 Infoblox Inc. All Rights Reserved.



Similar documents
IF-MAP Use Cases: Real-Time CMDB, and More

Security Coordination with IF-MAP

Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer

Security Orchestration with IF-MAP

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

Network Access Control (NAC) and Network Security Standards

WHITE PAPER. Infoblox IPAM Integration with Microsoft AD Sites and Local Services

Infoblox vnios Software for CISCO AXP

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

IF-MAP Driving IT Agility through an Infrastructure Revolution

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Network Access Security It's Broke, Now What? June 15, 2010

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT

Trust: When Physical and Logical Security Worlds Collide

Challenges in Deploying Public Clouds

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

HOW SDN AND (NFV) WILL RADICALLY CHANGE DATA CENTRE ARCHITECTURES AND ENABLE NEXT GENERATION CLOUD SERVICES

Web Authentication Application Note

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

OneFabric Connect. Overview. Extend the OneFabric architecture to 3rd party applications DATA SHEET BENEFITS BUSINESS ALIGNMENT

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

WhatsUpGold. v3.0. WhatsConnected User Guide

Pulse Policy Secure. RADIUS Server Management Guide. Product Release 5.1. Document Revision 1.0. Published:

Policy Management: The Avenda Approach To An Essential Network Service

Simplify IT. With Cisco Application Centric Infrastructure. Barry Huang Nov 13, 2014

Technical Note. ForeScout CounterACT Endpoint Detection & Inspection Methods

Cisco UCS Central Software

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Using Cisco UC320W with Windows Small Business Server

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

WHITE PAPER. Automating Network Provisioning for Private Cloud

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

NAC Guest. Lab Exercises

Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, :32 pm Pacific

Configuring Infoblox DHCP

RIDE THE SDN AND CLOUD WAVE WITH CONTRAIL

Technical Note. ForeScout CounterACT: Virtual Firewall

Installing and Using the vnios Trial

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

Simplifying Private Cloud Deployments through Network Automation

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

About the VM-Series Firewall

Cisco Knowledge Network

Trusted Network Connect (TNC)

Reliable DNS and DHCP for Microsoft Active Directory

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

USING THE DNS/DHCP ADMINISTRATIVE INTERFACE Last Updated:

User Identification (User-ID) Tips and Best Practices

Stanford SDN-Based Private Cloud. Johan van Reijendam Stanford University

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

CNS Implementing NetScaler 11.0 For App and Desktop Solutions

A Guide to New Features in Propalms OneGate 4.0

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

AdRadionet to IBM Bluemix Connectivity Quickstart User Guide

SANS Top 20 Critical Controls for Effective Cyber Defense

BRINGING NETWORKS TO THE CLOUD ERA

Quick Start Guide. for Installing vnios Software on. VMware Platforms

SOLARWINDS PUBLIC TRAINING CLASSES MODULES COVERED: NPM, SAM, NCM, NTA, IPAM & VNQM FEATURES & BENEFITS

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

IP ADDRESS MANAGER 4.3 (IPAM)

Infoblox Grid TM. Automated Network Control for. Unifying DNS Management and Extending the Infoblox Grid TM to the F5 Global Traffic Manager

IBM EXAM QUESTIONS & ANSWERS

SECURE ACCESS TO THE VIRTUAL DATA CENTER

How to Set Up Automatic Subnet Scan Using SolarWinds IP Address Manager. Share:

Cisco Prime Network Services Controller. Sonali Kalje Sr. Product Manager Cloud and Virtualization, Cisco Systems

Efficient and easy-to-use network access control and dynamic vlan management. Date: F r e e N A C. n e t Swisscom

Cisco & Big Data Security

Network Virtualization Network Admission Control Deployment Guide

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

TECHNOLOGY WHITE PAPER. Correlating SDN overlays and the physical network with Nuage Networks Virtualized Services Assurance Platform

Splunk: Using Big Data for Cybersecurity

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

STARTER KIT. Infoblox DNS Firewall for FireEye

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Microsoft Windows Server System White Paper

vcloud Director User's Guide

POLICY SECURE FOR UNIFIED ACCESS CONTROL

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

Implementing Microsoft Azure Infrastructure Solutions

User-ID Best Practices

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Control Tower for Virtualized Data Center Network

Transcription:

IF-MAP Overview Jan Ursi Technical Director EMEA

IF-MAP: A Powerful New Standard IF-MAP = Interface to Metadata Access Points An open protocol standard published (free) by the Trusted Computing Group Available since April, 2008 Version 2.0 released August, 2010 Pub/sub database - Like Facebook for IP devices and systems Supports a wide array of applications: Multi-Vendor Network Security (NAC) Compliance Management Asset Management Smart Grid Network Automation / Cloud Computing Could do for data sharing what IP did for connectivity

The Integration Challenge Supply Chain Mgmt Smart Grid CMDB AAA SIEM Network Location Switches Routers ERP Building Controls Factory Controls Infrastructure Management Network Security DNS, DHCP Asset Mgmt IPAM CRM HR Applications SNMP, Syslog, Netflow Custom Integration API s, Scripts Complex Costly Brittle High Maintenance 2010 Infoblox Inc. All Rights Reserved.

From Integration to Orchestration with IF-MAP Supply Chain Mgmt Smart Grid CMDB SIEM Switches AAA Routers Network Location ERP Building Controls Factory Controls Infrastructure Management Network Security DNS, DHCP Asset Mgmt IPAM CRM HR IF-MAP Protocol (Publish, Subscribe, Search) Applications IF-MAP Server Automatically aggregates, correlates, and distributes data to and from different systems, in real time 2010 Infoblox Inc. All Rights Reserved.

Today, Systems Share the IP Network, But Don t Share Data Network Security Physical Security Network Location Provisioning, Visualization & Analytics (Management) Decisions (Control) Sensors & Actuators

IF-MAP Doesn t Replace Existing Systems & Applications It Enables Them to Easily Share Data Network Security Physical Security Network Location Provisioning, Visualization & Analytics (Management) IF-MAP Server Decisions (Control) Sensors & Actuators

Many New Applications are Emerging Just the Tip of the Iceberg Physical Network Security Cyber/Physical Security IT Automation (CyPhy) Provisioning, Convergence Visualization & Analytics Don t allow users Track the location and status of all IT assets to connect to the (Management) MAP network if they haven t badged Database into the building Decisions Don t allow a (Control) wireless device to connect if its located outside of the building (IPs, MACs, devices, hardware, VMs, apps, users, etc.) in real time Allocate assets on the fly, dynamically reprovision data centers Asset Management Cloud Computing Federate authentication and authorization status across private & public clouds Move computing workloads to the cloud when prices drop Sensors & Actuators

Vendor Support for IF-MAP is Growing Vendor Product/Function IF-MAP Client IF-MAP Server Byre Security SCADA Security X Now Great Bay Endpoint Discovery X Now Hirsch Electronics Physical Access Control X Now Infoblox DHCP Server (NIOS) X Now Infoblox Orchestration Server (IBOS) X Now Juniper Infranet Controller (Policy Server) X X Now Logisense Registration Portal, Billing System X Now Lumeta Network Discovery & Leak Detection X Now Mikado NAC Solution X H1-11 NCP VPN Client X H1-11 Open Source IF-MAP Client Stack (PERL) X Now Open Source IF-MAP Client Stack (C++) X Q1-11 Open Source IF-MAP Server (Omapd, Irond) X Now Open Source SNMP/IF-MAP Bridge X Now Q1 Labs SIEM X Q1-11 Avail

Some Infoblox IF-MAP Projects Large Aircraft Manufacturer (In Production) Security for factory control (SCADA) traffic over wireless factory network Firewall configurations loaded dynamically from IF-MAP server Uses firewall/vpn gateways from Byres Security (Tofino) Software Development Company (In Production) Network access control without software agents on endpoints Uses Infoblox DHCP server, Juniper UAC, Juniper firewalls Las Vegas Hotel and Casino (In Production) Differentiated IP services for every room (3000 Juniper firewalls) Uses Infoblox DHCP, Juniper UAC and firewalls (3000), Logisense registration/billing portal Global Bank (Starting Rollout) Dynamic, secure desktops deploying to 8000 users Uses QIP DHCP, Juniper UAC and firewalls JANET - National ISP for Higher Education in UK (Pilot) Federation of authentication data for EDUROAM service Uses IF-MAP federation Real-Time CMDB (Pilot) Real-time discovery of devices joining the network Uses Infoblox DHCP, IF-MAP client and OneCMDB (Open Source CMDB)

IF-MAP Protocol Overview

Unique Characteristics Cited by IF-MAP Supporters 1. Open, standard protocol 2. Lightweight, easy to implement 3. No global schema supports emergent structures 4. Pub/sub paradigm

IF-MAP Components IF-MAP Client(s) IF-MAP Server employeeattribute = active User Name = John Doe distinguishedname = C=US, O=myco, OU=people, CN=12534 Department = Sales failed-login-attempts = 3, login-status = allowed role = access-finance-serverallowed 3 MAP Client Operations: Publish Subscribe Search 3 MAP Server Objects: Identifiers Links Metadata

IF-MAP Access Operations Publish: Tell others that <metadata > Clients store metadata into MAP for others to see Example: Authentication server publishes when a user logs in (or out) Search: Tell me if match(metadata pattern) Clients retrieve published metadata associated with a particular identifier and linked identifiers Example: An application can request the current physical location of the user Subscribe: Tell me when match(metadata pattern) Clients request asynchronous results for searches that match when others publish new metadata Example: Tell me when any user s status goes from employee to terminated

IF-MAP Server Objects Identifiers Links All objects are represented by unique identifiers Connote relationships between pairs of identifiers Metadata Attributes attached to Identifiers or Links Typical Data Types: Identifiers: Identity, IP address, MAC address, Session ID, Device Metadata: AAA info (authenticated, role, capabilities/policies) Device info (AV running, OS level, screen size, etc.) Event info (unauthorized access attempt, etc.), Layer 2 info (port, VLAN), location, etc. Many others, plus user-defined

Basic Components of MAP Content Identifiers Metadata Link

IF-MAP Use cases

Use Case Solution for Policy-Based Remote Access User= John Windows 802.1X Client 00:11:22:33:44:55 1- Endpoint plugs-in 2- SW sends EAP Start 3- Supplicant sends credentials 9- SW opens port 192.0.2.7 10- Endpoint requests DHCP 14- Endpoint generates traffic Infobox HA Pair DHCP/DNS Appliance 11-DHCP sends MAC-IP metadata to MAP identity = John MAP Database Accessrequestmac MAC = 00:11:22: 33:44:55 IP-MAC Cisco 3750 Switch 8- UAC sends RADIUS accept to SW Juniper SSG Firewall 4- SW sends RADIUS Credential to UAC 13- UAC activates L3 access on FW. Private Applications Juniper IC 4000 UAC 5- UAC does Auth. Lookup IF-MAP 6- UAC publishes To MAP Infobox HA Pair MAP Server 7- UAC subscribes to MAP 12-MAP sends IP- MAC to UAC AAA Authenticatedas CHANGE? CHANGE! Accessrequest = 113:3 Capability = access-privateapplications IP= 192.0.2.7

Use Case Integrated Network / Physical Security Solution Secure Zone 1 Zone 2 location = Zone 12 MAP Database Access Request Hirsch System (Physical Sensor) Publish: John in Zone 1 Publish: John in Zone 2 identity = John authenticated Cisco 3750 Switch Juniper SSG Firewall Policy Violation: Access Cut Off Classified Network Grants Access Request Juniper IC 4000 UAC Appliance Infoblox MAP Server Publish: John is Authenticated; Session ID 113:3 Subscribe: Changes to Session 113:3 Subscription Update: John in Zone 2 Publish (delete): John is Authenticated 11-12- 1-3- 4-5- 6-7- 8-9- 10- Hirsch UAC Employee Card MAP publishes Subscribes grants reader updates system (John) requests connects leaves access publishes firewall UAC to the to enters Zone the the for about to update policy the 1, access MAP zone to while corporate the update classified to the server to 1 location the to still MAP block the to MAP logged the network server access change MAP in CHANGE? CHANGE! Accessrequest = 113:3

Use Case: Real-Time CMDB 10.0.1.57 MANAGED NETWORK MAC = 00:11:22: 33:44:55 IP-MAC DISCOVERY SENSORS / AGENTS Infoblox DHCP Server Publish IP= 10.0.1.57 IP= 10.0.1.17 IP-MAC Discovery Engine Topology Builder CMDB SERVER Discovery Results Update CMDB Invoke Discovery CMDB MAP Client Infoblox MAP Server MAP Database MAC = 00:11:AA: 33:44:55 IP-MAC MAC = 00:11:11: 33:44:55 IP= 10.0.1.55

Use Case: SCADA Security IP-based industrial control traffic shares the general IT network in the factory Endboxes provide VPN/firewall security Endbox configurations dynamically loaded from MAP server based on user, role, etc. Provisioning Client

Use Case: Federated IF-MAP Servers for UK EDUROAM Service Enables login at remote universities / research centers using home login credentials Serves 1.9 million users across 850 locations Enabled today using RADIUS Proxy Service provider (JANET) maintains database of roaming activity Univ A JANET Univ B Bbaker, Roaming from University D OK! Radius Server Radius Server Radius proxy Radius Server Radius Server Univ C Roaming Users Jsmith@univB.edu Bbaker@univD.edu Univ D

IF-MAP Federation for Next Gen EDUROAM Service Local RADIUS servers replaced by RADSEC servers RADSEC servers communicate directly no need for proxy JANET no longer sees RADIUS transactions, no view of who is roaming IF-MAP Federation provides a solution: -Local RADSEC servers publish user/location data to local MAP server -JANET s central MAP server subscribes to changes on university MAP servers Univ A Univ B Jjames, Roaming from University B OK! RADSEC IF-MAP Client Jjames@ Jjames@ univb.edu univb.edu JANET Local IF-MAP Server RADSEC RADSEC RADSEC Univ C Local IF-MAP Server Central IF-MAP Server Federation Subscriptions Local IF-MAP Server Univ D

IF-MAP has Applications in Cloud Computing and IT Orchestration Infrastructure 2.0 Working Group has been discussing the impact of virtualization & cloud computing on the network Members include equipment vendors, cloud providers and end users Infoblox, Cisco, Google, Microsoft, F5, Citrix, Bechtel, Boeing, NASA Developing an inter-cloud registry service based on IF-MAP Ongoing project at Open Cloud Consortium in Chicago Co-sponsored by Cisco CTO s office and UCS group More info at www.infra20.com

Inter-Cloud Registry Helps Cloud Providers and Users to Match Workload Needs with Cloud Assets member of Cloud member of member of Virtual Network member of Virtual Network assigned to Virtual Machine Virtual Machine assigned to assigned to MAC Address IP Address assigned to assigned to Virtual Machine runs on assigned to MAC Address IP Address MAC Address IP Address

The Vision: IF-MAP Supports Data Exchange Among Infoblox, and Other Vendors Products Visibility Applications Infoblox DDI Provide DDI service Detect IPs Core Services DNS / DHCP / IPAM IF-MAP Orchestration Communicate / Take Action Closed Loop Automation Infoblox NCCM Check Infrastructure Infrastructure Recognize change 25

Resources

Infoblox NIOS Appliances Support IF-MAP Dynamically updates IF-MAP server when IPs are allocated, renewed, or released by NIOS DHCP server Infoblox NIOS Appliance Other systems can subscribe to updates and take action in realtime (e.g. discovery, configuration, scanning, open/close ports, etc.) Unique to the Infoblox DHCP server (today) DHCP Lease Information (IP, MAC, Start, Duration, etc.) IF-MAP Server

Infoblox Orchestration Server (IBOS): The World s Most Powerful IF-MAP Server Fully compliant with TCG standard Proven interoperability with other IF-MAP compliant products Unique Infoblox capabilities IF-MAP 2.0 compliant Lossless HA Fine-grained client authorization Data browser, extensive logging IF-MAP Federation Custom Identifiers Infoblox Orchestration Server Network Security Physical Security Network Location IF-MAP Client Systems

Resources Documentation & Freeware 3 minute video on IF-MAP on Orchestration/IF-MAP Solutions page on infoblox.com www.if-map.org IF-MAP community Web site Includes links to open source IF-MAP servers and other resources www.juniper.com Information about Infranet Controller: us/en/products-services/security/uac/#overview www.trustedcomputinggroup.org Complete protocol specs, information on TPM, TNC, Trusted Storage and related topics Infoblox IF-MAP Starter Kit: Free for 90 days, $995 in the US for perpetual license, 18% annual support VMware IF-MAP appliance Client simulator Open-source client stacks (PERL, java, C++) Open-source SNMP-MAP Bridge