How To Create A Network Access Control (Nac) Solution



Similar documents
Huawei One Net Campus Network Solution

Huawei esight Brief Product Brochure

United Security Technology White Paper

Huawei Network Edge Security Solution

Log Audit Ensuring Behavior Compliance Secoway elog System

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Huawei Business Continuity and Disaster Recovery Solution

SDN, a New Definition of Next-Generation Campus Network

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

HUAWEI OceanStor Load Balancing Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Virtual Machine in Data Center Switches Huawei Virtual System

Huawei Agile WAN Solution

Research on Operation Management under the Environment of Cloud Computing Data Center

Unisys Internet Remote Support

Network Security Policy

Mobile Admin Architecture

Eudemon8000 High-End Security Gateway HUAWEI TECHNOLOGIES CO., LTD.

Trademark Notice. General Disclaimer

Overcoming Security Challenges to Virtualize Internet-facing Applications

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Secospace elog. Secospace elog

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

VIA COLLAGE Deployment Guide

Huawei PAN BYOD Converged Network Solution

Windows 7, Enterprise Desktop Support Technician

Cloud Design and Deployment on Intel Xeon Processor-based Platforms

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Software. Quidview 56 CAMS 57. XLog NTAS 58

ACME Enterprises IT Infrastructure Assessment

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

Dell One Identity Cloud Access Manager How To Deploy Cloud Access Manager in a Virtual Private Cloud

Cisco Virtual Office Unified Contact Center Architecture

SysAid Cloud Architecture Including Security and Disaster Recovery Plan

USER GUIDE: MaaS360 Services

HP A-IMC Firewall Manager

How to Guide: StorageCraft Cloud Services VPN

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Managing the Real Cost of On-Demand Enterprise Cloud Services with Chargeback Models

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

BIMS - Branch Intelligent Management System

ITKwebcollege.ADMIN-Basics Fundamentals of Microsoft Windows Server

Secure networks are crucial for IT systems and their

Offer Highly Available SAAS Solutions with Huawei. Huang Li Executive Vice President of isoftstone

Course Outline. ttttttt

Network Security Administrator

Huawei Smart Education Solution

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Security Level: HUAWEI TECHNOLOGIES CO., LTD.

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Fundamentals of a Windows Server Infrastructure Course 10967A; 5 Days, Instructor-led

Ensuring the security of your mobile business intelligence

Module 3: Resolve Software Failure This module explains how to fix problems with applications that have problems after being installed.

SCADA SYSTEMS AND SECURITY WHITEPAPER

Cisco Application Networking for IBM WebSphere

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Huawei Cloud Data Center Solution

HUAWEI USG2000&5000 Series Unified Security Gateway Content Filtering White Paper

Information Technology Policy

VIA CONNECT PRO Deployment Guide

OSU INSTITUTE OF TECHNOLOGY POLICY & PROCEDURES

Payment Card Industry Data Security Standard

Fundamentals of a Windows Server Infrastructure MOC 10967

MSP Service Matrix. Servers

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

OceanStor UDS Massive Storage System Technical White Paper Reliability

Quidway SVN3000 Security Access Gateway

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Security Technology White Paper

HP IMC Firewall Manager

How To Manage A Virtualization Server

Configuring Windows Server 2008 Network Infrastructure

Huawei Remote Access Security Solution for Enterprise Networks. -Secure and Stable Platforms for Network Interconnection and Data Interaction

Remote Access Platform. Architecture and Security Overview

HUAWEI Tecal E6000 Blade Server

Security Design.

ICANWK406A Install, configure and test network security

Microsoft Private Cloud

Enterprise Network Virus Protection Research Yanjie Zhou 1, Li Ma 2 Min Wen3

GRAVITYZONE HERE. Deployment Guide VLE Environment

Deployment Options for Microsoft Hyper-V Server

Multi-Domain Security Management

Remote Access Clients for Windows

HUAWEI TECHNOLOGIES CO., LTD. Huawei FusionCloud Desktop Solution

1 Purpose Scope Roles and Responsibilities Physical & Environmental Security Access Control to the Network...

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

Optimal Network Connectivity Reliable Network Access Flexible Network Management

HP Intelligent Management Center Enterprise Software. Platform. Key features. Data sheet

Policy Management: The Avenda Approach To An Essential Network Service

Transcription:

Huawei Terminal Security Management Solution Create Enterprise Intranet Security

Terminal Security Management Solution 01 Introduction According to the third-party agencies such as the Computer Security Institute (CSI), Federal Bureau of Investigation (FBI), International Data Corporation (IDC), and the National Computer Network Emergency Response Technical Team/ Coordination Center of China information (CNCERT/CC), most security incidents occur in the enterprise intranet. Security at the terminal of an intranet has become the biggest challenge for enterprise IT managers. Incidents involving information leaks, unauthorized access, slowdown or breakdown of machines, core service interruption, and network disconnection cause huge losses for enterprises. Traditional desktop management or terminal security management (TSM) solutions are insufficient in forcibly deploying TSM clients on terminals and preventing malicious attacks from occurring. The following problems must be solved to seek a new solution: It is hard to find a right network access control (NAC) solution that can adapt to the highly complex access environments (HUB access, wireless access, VPN, NAT, and remote branch offices, with devices from multiple manufactures) while supporting system upgrades and reconstruction at the same time. It is hard to keep up with the constant requirements of terminal security at the lowest cost. It is hard to deploy and manage the TSM system with limited resources and unskilled IT administrators. Based on years of experience in the TSM field, Huawei TSM team has developed an intuitive and user-friendly NAC solution that not only provides flexible security to access gateways but also basic network devices such as switches and routers. A document security management (DSM) system has also been added in the solution providing users with powerfully enhanced document management services. In this solution, operators can directly control user access to the network by using switches and routers in the basic network without affecting the network performance and reliability. In scenarios where access control points cannot be deployed on switches or routers, a security access gateway is added to the live network for access control. As a result, devices do not need to be replaced during network reconstruction. By using identity-based networks, Huawei TSM solution provides the following basic functions: Access control Security management Desktop management Document management These functions are closely integrated to ensure terminal security. Security management acts as the core function, while the access control provides active measures for the solution, and desktop management and document management are supplementary functions. This solution equips enterprises with a completed end-to-end TSM system, which is cost-effective to construct and easy to maintain. Huawei TSM solution has the following features: Reduces the risks involved in IT systems, such as information leaks, malicious code spreading, network or service interruption, compliance risks, and asset loss Improves the overall performance of terminals, network, and applications

02 Terminal Security Management Solution Reduces hidden costs in asset management and maintenance Once Huawei TSM solution is applied, the following tasks are fully operational: Improving IT availability and security Reducing the cost in intranet security management Improving intranet management efficiency Figure 1-1 TSM design TMS Design Policy Identity authentication Security check Repair Authorized access Monitoring Response Audit Remote employees Service information Onsite employees Key information resources Visitors External unauthorized users Blocking unauthorized users Isolating untrusted users and repairing loopholes Authorizing user access Monitoring operations and providing audit evidence General information resources Act PDCA Plan Check Do The TSM system and the DSM system constitute the Huawei TSM solution. NAC devices, including switches, routers, and security access control gateway (SACG) The TSM system consists of: The DSM system consists of: Terminal management center (TMC) Document management center (DMC) Security agent (SA) Document management server (DS) Security manager (SM) Document proxy client (DC) Security controller (SC)

Terminal Security Management Solution 03 Figure 1-2 TSM system architecture Terminal agent NAC device TSM server group DHCP server Intranet DNS server Pre-authentication domain Patch server Antivirs(AV)server Isolated domain Service server group :SA :NAC point :SM or SC Table 1-1 TSM system component Item TMC SA SM SC Switch Router Description The TMC software is used for layered management and deployment. As the management center for Huawei TSM solution, TMC is used to make overall security policy, deliver the policy to TSM nodes, and monitor the policy implementation on these nodes. The SA software is installed on terminal hosts to automatically collect information about terminal assets and security status, and help users in identity authentication and security check. SA occupies a small number of terminal resources and consumes a small amount of system resources. The CPU usage is less than 2%, and the maximum memory usage is 15 MB. The SM software is the core security management module for Huawei TSM solution, and provides services such as assets management, software distribution, patch management, log audit, TSM policy management, identity management, and report management. An SM adopts a Browser/Server (B/S) structure for the administrator to control the system on web pages. An SM can manage multiple SCs. The SM and the SC constitute the server for the TSM system. The SC software manages the SA based on data configured by the SM. The SM gives instructions for the SC to coordinate related devices and provide management services. After a user pass the SA authentication, the SC controls devices such as switches, routers, and the SACG at the access control point to enable the user to access the network. The switch is the network hardware that controls terminal access to the network and enables different access rights to terminal users of different identities in different security state. Switches used for security access control can be deployed at the access layer or the aggregation layer, and is necessary in basic networking. The router is the network hardware for terminal access control, and is also necessary in basic networking. You can select routers or switches as NAC devices based on network deployment requirements.

04 Terminal Security Management Solution Item Description SACG The SACG is a security access gateway that controls terminal access to the network and enables different access rights to terminal users of different identities in different security state. When switches and routers cannot be deployed, you can add SACG devices for access control. Figure 1-3 DSM system architecture DMC DSM Server Document Protection Authorized access DC1 Author Document distribution DC2 Reader DMC: DSM management center DS:DSM server DC:DSM client The DSM system consists of the DS, DMC, and DC. Table 1-2 DSM system component Item DS Description The DS software is in charge of handling terminal users' requests, user authentication, user authorization, encryption, decryption, and log audit. The DS also saves and manages document permissions and keys. DMC The DMC software is deployed at the first layer in the DSM architecture and functions as the management server. The DMC controls the access of servers on the second layer. The DMC manages users, alarms, servers, and policies. DC The DC software provides functions such as document encryption, document permission control, offline reading, and document recovery.

Terminal Security Management Solution 05 Solution Features The TSM solution provides comprehensive network access modes for different access terminals in enterprises. Supports 802.1x, portal, and firewall access control modes based on switches, routers, or Security Access Control Gateways (SACGs). Supports the deployment of NAC across multiple connection modes such as wireless network adapter, network cable, Virtual Private Network (VPN), and dialup network. Uses switches and routers to control user access. Devices do not need to be replaced during network reconstruction. Therefore, the network performance, reliability, and scalability are not affected. Offers various authentication modes to flexibly control terminal access between various operating systems, between enterprise employees, affiliated partners, and customers. This ensures consistent and friendly user experience. realizes self-management on a terminal. Identifies a terminal's location and automatically selects security policies for employees in remote offices to conveniently access the intranet. Scores network management and terminal compliance, and evaluates the terminal security status and security trend. The TSM solution greatly reduces management and maintenance costs. The TSM solution provides excellent security management functions, implementing end-to-end security protection. Allows users to deploy terminals by stages and flexibly control the deployment progress. Provides server push technology for convenient deployment on a client terminal. Provides integrated configuration management interfaces to automatically identify non-pc devices. This alleviates engineers from collecting, registering, and maintaining non-pc devices. Provides identity authentication and guest management services to control the access of extranet and Internet users to intranet resources, reducing the administrator's workload. Provides automatic warning for unauthorized behavior, one-key automatic recovery or guided recovery. This Provide an all-around TSM system for enterprises that integrates identity authentication, network access control, terminal security hardening, office operation and network access management, network protection, information leak protection, asset management, software deployment, remote assistance, and message bulletins. Integrates document security management and portable storage device management, forming the most dependable end-to-end security solution in the TSM field.

06 Terminal Security Management Solution The TSM solution meets personalized and customized requirements of enterprises. Supports expansion of the database size to meet requirements for auditing logs in large-scale databases. Supports self-defined checking policies including selfdefined checking items, terminal prompt messages, violation reporting messages, and automatic recovery actions. Pre-defines a large number of security policies and daily management reports. Users can also self-define and collect a library of security policies and daily management reports from Huawei cloud security center to meet personalized and constant security requirements. Monitors the intranet security situation based on intelligent analysis and deep data mining, which provides maintenance and policy supports for IT management. Provides a monitoring platform that can detect potential faults and generate alarms in the case of faults. The system administrator can remotely monitor the system s running status. Provides online fault diagnosis and rectifies client faults in batches. The TSM solution and the DSM system constitute as an end-to-end Huawei TSM solution. The powerful DSM system can manage document permissions, and effectively control access to certain documents that may be shared between enterprise employees, affiliated partners, and customers by implementing restrictions on users, access modes, and access time. The real-time permission control allows users to change or retrieve document permissions at any time. The TSM solution features excellent reliability and ensures that the network runs properly. Uses carrier-class hardware devices and supports the two-node cluster and network interruption survival functions. The reliable and secure solution ensures service continuity. Provides distributed file storage and rapid file distribution on a subnet for large files, which realizes minimum bandwidth occupation and high-efficiency distribution.

Terminal Security Management Solution 07 Huawei TSM Solution Components Figure 1-4 Huawei TSM solution components Item Component Product Model NAC devices Software Access switch Aggregation switch Core switch UTM firewall or the integrated device Access control server Access control client DSM sever DSM client S5700, S3700, and S2700 S7700 and S5700 S9300 E200E-X and E1000E-X TSM Server TSM Agent DSM Server DSM Client Order Information Table 1-3 Order information Item Component Product Model Switch Router TSM server The switch is a basic network device that includes the terminal access control module and is not restricted by the license control. You can select a proper model based on the actual networking. The router is a basic network device that includes the terminal access control module and is not restricted by the license control. You can select a proper model based on the actual networking. The TSM server provides control items for the following functions: Access control Security policy management Access management Software distribution Patch management Personnel operation management You can select the functions based on the actual requirements. Mandatory Mandatory Mandatory

08 Terminal Security Management Solution Item Component Product Model TSM terminal licenses DSM server DSM terminal licenses Each function has a terminal license, the number of which is the same as that of terminals on the live network. Licenses for all functional modules must be the same. The DSM server provides services to manage documents and ensure document security. The quotation prices of the DSM terminal license vary with the following sections of terminal numbers: 1 99 100 199 200 499 500 999 1000 1999 2000 4999 5000 and more The number of licenses is the same as those of terminals on the live network. Mandatory Optional Optional SACG You can select a proper model based on the NAC plan. Optional Purchased products You can select a host server, an operating system, a database, or prepare these products by yourself. Optional Service System installation and commissioning services for security devices Optional

Copyright Huawei Technologies Co., Ltd. 2011. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademark Notice, HUAWEI, and are trademarks or registered trademarks of Huawei Technologies Co., Ltd. Other trademarks, product, service and company names mentioned are the property of their respective owners. General Disclaimer The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.