How To Use Cisco Identity Based Networking Services (Ibns)



Similar documents
Cisco TrustSec How-To Guide: Planning and Predeployment Checklists

Cisco Trust and Identity Management Solutions

Cisco TrustSec Solution Overview

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Cisco TrustSec How-To Guide: Guest Services

On-boarding and Provisioning with Cisco Identity Services Engine

UNDERSTANDING IDENTITY-BASED NETWORKING SERVICES AUTHENTICATION AND POLICY ENFORCEMENT

MAC Authentication Bypass

TrustSec How-To Guide: On-boarding and Provisioning

Switch Configuration Required to Support Cisco ISE Functions

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

Configure ISE Version 1.4 Posture with Microsoft WSUS

Cisco Secure Access Control System 5.5

Cisco Secure Control Access System 5.8

New Cisco IOS Software Release 12.2(35)SE for Cisco Catalyst 3750, 3560, 3550, 2960, 2970 Series Switches; and CBS30x0 Series Blade Switches

Why Migrate to the Cisco Unified Wireless Network?

Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks

Implementing and Configuring Cisco Identity Services Engine SISE v1.3; 5 Days; Instructor-led

XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Integration with IP Phones

New Features in Cisco IOS Software Release 12.2(33)SXI2

MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

TABLE OF CONTENTS NETWORK SECURITY 1...1

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Using IEEE 802.1x to Enhance Network Security

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

ClearPass Policy manager Cisco Switch Setup with CPPM. Technical Note

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

Cisco NetFlow Generation Appliance (NGA) 3140

Aruba Mobility Access Switch and Arista 7050S INTEROPERABILITY TEST RESULTS:

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

HP E-PCM Plus Network Management Software Series

Network Access Control ProCurve and Microsoft NAP Integration

Power over Ethernet (PoE) Power Requirements FAQ

Securing Networks with PIX and ASA

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Network Security 1 Module 4 Trust and Identity Technology

Passguide q

Security. AAA Identity Management. Premdeep Banga, CCIE # Cisco Press. Vivek Santuka, CCIE # Brandon J. Carroll, CCIE #23837

SOSPG2. Implementing Network Access Controls. Nate Isaacson Security Solution Architect

Cisco EXAM Enterprise Network Unified Access Essentials. Buy Full Product.

Crestron Electronics, Inc. AirMedia Deployment Guide

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Example: Configuring VoIP on an EX Series Switch Without Including 802.1X Authentication

Configure IOS Catalyst Switches to Connect Cisco IP Phones Configuration Example

POLICY SECURE FOR UNIFIED ACCESS CONTROL

Implementing Cisco IOS Network Security v2.0 (IINS)

Cisco Secure BYOD Solution

Configuring LLDP, LLDP-MED, and Location Service

Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Cisco Configuration Assistant

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

Cisco Nexus 1000V Switch for Microsoft Hyper-V

Systems Manager Cloud Based Mobile Device Management

DYNAMIC SECURE MOBILE ACCESS

802.1X Authentication, Link Layer Discovery Protocol (LLDP), and Avaya IP Telephones

Policy Management: The Avenda Approach To An Essential Network Service

Avaya Identity Engines Portfolio

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Evolving Network Security with the Alcatel-Lucent Access Guardian

How To Set Up Hopkins Wireless On Windows 7 On A Pc Or Mac Or Ipad (For A Laptop) On A Network Card (For Windows 7) On Your Computer Or Ipa (For Mac Or Mac) On An Ipa Or

Cisco Identity Services Engine

Symantec VIP Integration with ISE

Implementing and Managing Microsoft Desktop Virtualization

Best Practices for Outdoor Wireless Security

VLANs. Application Note

Network Virtualization Network Admission Control Deployment Guide

Exam Name: Cisco Sales Associate Exam Exam Type: Cisco Exam Code: Doc Type: Q & A with Explanations Total Questions: 50

IMPLEMENTING CISCO SWITCHED NETWORKS V2.0 (SWITCH)

HP Intelligent Management Center User Access Management Software

Configuring the Device for Access Point Discovery

Management, Logging and Troubleshooting

EPICenter Network Management Software

CT5760 Controller and Catalyst 3850 Switch Configuration Example

Avaya Virtualization Provisioning Service

Using Cisco UC320W with Windows Small Business Server

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

How To Set Up An Ipa 1X For Aaa On A Ipa 2.1X On A Network With Aaa (Ipa) On A Computer Or Ipa (Ipo) On An Ipo 2.0.1

Using Link Layer Discovery Protocol in Multivendor Networks

Networking Systems (10102)

Configuring Cisco Nexus 5000 Switches Course DCNX5K v2.1; 5 Days, Instructor-led

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

Cisco Unified Videoconferencing Manager Version 5.5

Cisco Secure Access Control Server 4.2 for Windows

STEP III: Enable the Wireless Network Card. STEP IV: Print out the Printer Settings pages to determine the IP Address

Features Description Benefit AP-7131N support Adaptive AP Support for the AP7131N-GR and AP7131N- GRN

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points

Network Access Security It's Broke, Now What? June 15, 2010

MS Series: VolP Deployment Guide

How To Configure Voice Vlan On An Ip Phone

Remote Application Server Version 14. Last updated:

Cisco Wireless Control System (WCS)

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security. Cisco Small Business Access Points

Cisco Virtual Office Express

ClearPass: Understanding BYOD and today s evolving network access security requirements

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Cisco UCS Central Software

Transcription:

. Data Sheet Identity-Based Networking Services Identity-Based Networking Services Overview Cisco Identity-Based Networking Services (IBNS) is an integrated solution that offers authentication, access control, and user policy enforcement to help secure network connectivity and resources. IBNS helps customers increase user productivity, reduce operating costs, increase visibility, and enforce policy compliance. The three basic components of IBNS are 1. Cisco Catalyst switches (or wireless access points) 2. Cisco Secure Access Control System (ACS) 3. Cisco Secure Services Client (SSC) These components, together with an existing identity management infrastructure such as Microsoft Active Directory or LDAP-capable directory, provide policy enforcement at the network edge. Figure 1. Basic IBNS Component Cisco IBNS is an easy-to-deploy identity solution that incorporates extensive Cisco testing efforts, including feature development, regression testing, and solutions testing. The IBNS solution is based on real-life customer deployments and provides the following benefits: Strong authentication of users and devices on wired and wireless LANs Identity feature consistency across Cisco Catalyst switches Tight integration between various components in the solution: the authenticator, authentication server, and supplicant 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 5

Architecture that allows a phased deployment approach that gradually introduces identity-based access control A solution that has been tested in-house and then hardened with alpha and beta customer testing The solution also includes deployment and configuration guides. Cisco IBNS uses the following software versions: Cisco Catalyst 3000 Series Switches: Cisco IOS Software Release 12.2(50)SE Cisco Catalyst 4500 Series Switches: Cisco IOS Software Release 12.2(50)SG Cisco Catalyst 6500 Series switches: Cisco IOS Software Release 12.2(33)SXI Cisco Secure Access Control System (ACS) Version 5.0 Cisco Secure Services Client (SSC) Version 5.1 Microsoft Windows XP and Vista supplicant Cisco IBNS offers a phased, scenario-based deployment strategy so that customers can roll out the solution with minimal impact to end users. Monitoring, low-impact, and high security deployment modes apply specific combinations of features and configurations to satisfy a particular set of use cases (Table 1). Instead of starting from scratch, you can follow the guidelines for a particular deployment scenario and then, if necessary, customize it to suit your network requirements. Table 1. Mode Monitor mode Deployment Modes for Cisco IBNS Provides visibility into access on your network. Includes a pre-access-control deployment assessment and a policy evaluation Low-impact mode High security mode Reduces known issues with other protocol timeouts and networked services. Enables differentiated access through policydriven downloadable access control lists (dacls) based on identity or group. Provides the highest level of LAN-based access security for environments where access cannot be granted without authentication. For more information about Cisco IBNS, please visit http://www.cisco.com/go/ibns. Cisco IBNS Software Features The following Cisco IBNS features are available across Cisco Catalyst switches: Flexible authentication sequencing: This feature provides a flexible fallback mechanism among IEEE 802.1X, MAC authentication bypass (MAB), and web authentication methods. It also allows switch administrators to control the sequence of the authentication methods. This simplifies identity configuration by providing a single set of configuration commands to handle different types of endpoints connecting to the switch ports. In addition, this feature allows users to configure any authentication method on a standalone basis. For example, MAB can be configured without requiring IEEE 802.1X configuration. IEEE 802.1X with open access: This feature allows 802.1X and MAB authentication without enforcing any kind of authorization. There is no impact to users or endpoints: They continue to get exactly the same kind of network access that they did before you deployed IBNS. Having visibility into the network gives you insight into who is getting access, who has an operational 802.1X client, who is already known to existing identity stores, and who has credentials, as well as other information. IEEE 802.1X, MAB, and web authentication with downloadable ACLs: This feature allows ACLs to be downloaded from the Cisco Secure ACS as policy enforcement after authentication using IEEE 802.1X, MAC authentication bypass, or web authentication. 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 2 of 5

Cisco Discovery Protocol enhancement for second-port disconnect: For IP telephony environments, Cisco Discovery Protocol is enhanced to add a new Type-Length-Value (TLV) for the IP phone to indicate when a PC disconnects from the IP phone. Upon receiving this notification, the switch can clear the authentication session for the PC Inactivity timer for IEEE 802.1X and MAB: With this local inactivity timer for IEEE 802.1X and MAB, if the authenticated devices stay idle for longer than the defined period, the switch resets the security record of the devices. Multidomain authentication: This feature allows an IP phone (Cisco or non Cisco) and a PC to authenticate on the same switch port while it places them on appropriate voice and data VLANs. IEEE 802.1X with multiauth: Multiple authentications allows more than one host to authenticate on an IEEE 802.1X-enabled switch port. With multiauth, each host must authenticate individually before it can gain access to the network resources; this is necessary in a virtualized environment. Centralized web authentication: This feature allows the switch to redirect users using HTTP URL redirection to a central web authentication server or a guest access server for authentication before accessing the network resources. Common session ID: IEEE 802.1X and MAB will use a session ID identifier for all 802.1X and MAB authenticated sessions. This session ID will be used for all reporting purposes, such as show commands, MIBs, syslog, and RADIUS messages, and allows users to distinguish messages for one session from others. The following Cisco IBNS features are available on Cisco Secure ACS 5.0: A distributed deployment model that enables large-scale deployments, such as identity deployment in a campus environment A powerful, attribute-driven rules-based policy model that addresses complex policy needs in a flexible manner Integrated advanced monitoring, reporting, and troubleshooting capabilities for maximum control and visibility Improved integration with external identity and policy databases, including Windows Active Directory and Lightweight Directory Access Protocol (LDAP)-accessible databases, simplifying policy configuration and maintenance The following Cisco IBNS features are available on the Cisco Secure Services Client (SSC): A wireless interface that can be disabled when a wired connection is present, eliminating unwanted wireless bridging to the wired network An 802.1X identity-based network security framework Configuration and enforcement of access policies to protect corporate resources and assets Authenticated access to 802.1X wired and wireless LANs Cisco Secure Access Control System (ACS) 5.0 Ordering Information Cisco Secure ACS is a next-generation platform for centralized network identity and access control. Cisco Secure ACS 5.0 features a simple yet powerful rule-based policy model and a new, intuitive management interface designed for optimum control and visibility. Cisco Secure ACS 5.0 is offered as a dedicated appliance, the Cisco 1120 Secure Access Control System, and as software for customers building a virtual infrastructure using VMWare ESX. The appliance and software versions of Cisco Secure ACS 5.0 support the same features. For system specifications, please view the data sheet at http://www.cisco.com/go/acs. 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 3 of 5

Table 2 lists the part numbers for Cisco Secure ACS hardware and software. Table 2. Cisco Secure ACS Ordering Information CSACS-1120-K9 CSACS-5.0-IENVM-K9 CSACS-5-MON-LIC= CSACS-5-LRG-LIC= Cisco Secure 1120 Appliance with preinstalled Cisco Secure ACS 5.0 and Base license Cisco Secure ACS 5.0 software for VMWare with Base license Cisco Secure ACS 5.0 Advanced Monitoring and Reporting add-on license Cisco Secure ACS 5.0 Large Deployment add-on license Cisco Secure Services Client Ordering Information The Cisco Secure Services Client is a software application that enables businesses of all sizes to deploy a single authentication framework across endpoint devices for access to both wired and wireless networks. The Cisco Secure Services Client solution delivers simplified management, robust security, and lower total cost of ownership. Table 3 lists the part numbers for Cisco Secure Services Client Version 5.1. To download the Cisco Secure Services Client, visit the Cisco Ordering Home Page. Table 3. Cisco SSC Ordering Information AIR-SC5.0-XP2K AIR-SSC-VISTA AIR-SSCFIPS-DRV Cisco Secure Services Client (Windows XP/2000) Cisco Secure Services Client (Windows Vista) Cisco Secure Services Client FIPS drivers (Windows XP only) Cisco NAC Profiler Ordering Information The Cisco NAC Profiler enhances the deployment and administration of Cisco IBNS by maintaining a real-time list of all network-attached endpoints, such as IP phones and networked printers. Table 4. Cisco NAC Profiler Ordering Information NAC3350-PROF-K9 NAC3350-CLT-K9= NAC3310-CLT-K9= NAC3310-PROF-K9 NAC3310-1000C-K9 NAC3350-3000C-K9 NAC3350-5000C-K9 NAC3350-7000C-K9 Cisco NAC Profiler Server Cisco NAC Collector License for Cisco NAC 3350 Appliances Cisco NAC Collector License for Cisco NAC 3310 Appliances NAC 3310 Profiler-max up to 5K devices NAC 3310 Collector-max 1000 devices NAC 3350 Collector-max 3000 devices NAC 3350 Collector-max 5000 devices NAC 3350 Collector-max 7000 devices For more information on how to order Cisco NAC Profler, including fail-over and device licenses, please visit http://www.cisco.com/en/us/prod/collateral/vpndevc/ps5707/ps8418/ps6128/prod_bulletin0900aecd806b7d69.html Cisco IBNS Feature Availability for Cisco Catalyst Switches Table 5 describes the new Cisco IOS Software-based IBNS features available with enterprise-class Cisco Catalyst switches. All Cisco IOS Software releases are available for order now. Customers interested in purchasing these products can place orders through their normal sales channels. 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 4 of 5

Table 5. New Cisco IBNS Features for Enterprise-Class Switches Feature Catalyst 3000 Series Switches Catalyst 4500 Series Switches Catalyst 6500 Series Switches Flexible authentication sequencing IEEE 802.1X with open access IEEE 802.1X, MAB, and web authentication with downloadable ACL Cisco Discovery Protocol enhancement for second-port disconnect Inactivity timer for IEEE 802.1X and MAB Multidomain authentication 12.2(25)SEC 12.2(31)SG 12.2(33)SXI IEEE 802.1X with multiauth Centralized web authentication Common session ID For More Information For more information about Cisco products, please contact your Cisco account manager or Cisco channel partner. For more information about Cisco IBNS, go to: http://www.cisco.com/go/ibns For more information about Cisco Catalyst switches, go to: http://www.cisco.com/go/switches For more information about Cisco Secure ACS, go to: http://www.cisco.com/go/acs For more information about Cisco SSC, go to: http://www.cisco.com/en/us/products/ps7034/index.html For more information about the Cisco NAC Profiler, go to: http://www.cisco.com/en/us/products/ps8464 Printed in USA C78-542121-00 06/09 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 5 of 5