User Authentication in the Enterprise Network



Similar documents
Using IEEE 802.1x to Enhance Network Security

IEEE 802.1X Overview. Port Based Network Access Control

Network Access Security It's Broke, Now What? June 15, 2010

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

Catapult PCI Compliance

Secure Networks for Process Control

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

Network Security Guidelines. e-governance

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

State of Texas. TEX-AN Next Generation. NNI Plan

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Using RADIUS Agent for Transparent User Identification

HARTING Ha-VIS Management Software

CTS2134 Introduction to Networking. Module Network Security

7.1. Remote Access Connection

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)

Prepare your IP network for HD video conferencing

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Securing SIP Trunks APPLICATION NOTE.

4. Getting started: Performing an audit

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

IP Telephony Management

User Management Guide

Enterprise Network Solution

Cisco TrustSec How-To Guide: Guest Services

Lecture 3. WPA and i

Particularities of security design for wireless networks in small and medium business (SMB)

ethernet services for multi-site connectivity security, performance, ip transparency

IEEE 802.1X For Wireless LANs

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Belnet Networking Conference 2013

Diploma in Network (LAN/WAN) Administration

Dial-on Demand VPN connectivity

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

Chapter 8 Advanced Configuration

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

vwlan External RADIUS 802.1x Authentication

VLANs. Application Note

Configuring the Cisco SPA9000 Voice System with the Cyberdata VoIP Intercom for Door Bell Applications

Deploy Remote Desktop Gateway on the AWS Cloud

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Managed WiFi. Choosing the Right Managed WiFi Solution for your Organization. Get Started Now: to learn more.

Secure SCADA Network Technology and Methods

IT HEALTHCHECK TOP TIPS WHITEPAPER

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Achieving PCI-Compliance through Cyberoam

Interlink Networks RAD-Series AAA Server and RSA Security Two-Factor Authentication

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Borderware MXtreme. Secure Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

SIP Security Controllers. Product Overview

Aerohive Private PSK. solution brief

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Cisco Wide Area Application Services (WAAS) Software Version 4.0

Defender EAP Agent Installation and Configuration Guide

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Designing and Implementing a Server Infrastructure MOC 20413

epass OTP Authentication System White Paper

Threats to be considered (1) ERSTE GROUP

Cisco Router and Security Device Manager (SDM)

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Windows Remote Access

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Desktop Central Managing Windows Computers in WAN

Network Performance Monitoring at Minimal Capex

Hosted SharePoint: Questions every provider should answer

Implementing Core Cisco ASA Security (SASAC)

How To Set Up Wireless Network Security Part 1: WEP Part 2: WPA-PSK Part 3-1: RADIUS Server Installation Part 3-2: 802.1x-TLS Part 3-3: WPA

LifeSize Video Communications Systems Administrator Guide

Switch Configuration Required to Support Cisco ISE Functions

Configuring Wired 802.1x Authentication on Windows Server 2012

PREPARED FOR ABC CORPORATION

Abstract. Avaya Solution & Interoperability Test Lab

13 Courses Quick Guide

The Next Generation Network:

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Diagnosing the cause of poor application performance

IBM Managed Security Services Vulnerability Scanning:

Microsoft Windows Server System White Paper

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

12 Security Camera System Best Practices - Cyber Safe

Network Security Solutions Implementing Network Access Control (NAC)

Beyond Quality of Service (QoS) Preparing Your Network for a Faster Voice over IP (VoIP)/ IP Telephony (IPT) Rollout with Lower Operating Costs

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

Secure VidyoConferencing SM TECHNICAL NOTE. Protecting your communications VIDYO

Transcription:

User Authentication in the Enterprise Network Technology for secure accessibility to Enterprise IT services 2001 Enterasys Networks, Inc. All rights reserved. Steve Hargis Technical Director Office of the CTO Enterasys Networks 2-02

Expectations: Utility-Like Data Services High performance (bandwidth) Predictability (latency, delivery, etc) Availability (total service availability) Reliability (utility-like uptime characteristics) Cost effective (system wide TCO) QoS capabilities (business policies) Simplicity (non-complex) Manageable (visibility) And??????? 2-02 2

A Traditional View of Security Keep the Bad Guys out! Lock the doors. Ignore the problem until IDS IDS Internet Internet X R R R X R 2-02 3

A Traditional View of Security Any point of access to the network can allow a security breach VPN IDS IDS Internet Internet X R R R X R AP 2-02 4

Importance of Infrastructure Security Trouble can come from outside or inside "Traditionally, about 70% of security breaches were being reported as having originated from within the organization itself" - META Group There are many security holes in most networks The idea of the trusted machine is obsolete Unnecessary daemons (processes) running on networked machines allow vulnerabilities to be exploited Defaults (passwords, SNMP community strings, etc) are often left in equipment creating vulnerabilities. "Network complexity combined with a never-ending stream of software upgrades and patches leave many networks vulnerable to attack" - IDC 2-02 5

The Threat from PETE One in 700 employees is actively working against the company 75% of all technology losses occur from employees and those with trusted relationships http://www.asisonline.org Trends in Intellectual Property Loss 2-02 6

So What About Authentication? Who Authenticates today? Remote Access Users (dial-up) VPN Users Everyone to the Domain and Application Servers? Logon 2-02 7

The Need for User Based Authentication Extending the traditional Authentication boundaries of the enterprise network enables security and personalization. Current Authenticated Areas 802.1X Authenticated Areas Internet Enterprise WAN RAS Server / NOS / Directory 2-02 8

IEEE 802.1X Leverages well defined Extensible Authentication Protocol (EAP) {RFC 2294} with some specific extensions for characteristics of 802 LANs (EAPoL) EAP is a general protocol supporting various authentication methods (MD5, TLS, Smartcards, Certificates, PKI, 2-Factor, etc.) 802.1X is a method for performing authentication to obtain access to IEEE 802 LANs. Ideally occurs at the first point of attachment (edge device) Specifies a protocol between devices desiring access to the LAN and devices providing access to the LAN Specifies the requirements for a protocol between the Authenticator and an Authentication Server (e.g. RADIUS) Specifies management operations via SNMP 2-02 9

Definitions Authenticator An entity that requires the device on the end of an attached link to be authenticated. Supplicant The device entity requesting to be authenticated by the Authenticator and thereby gain access to the services of the Authenticator. Authentication Server An entity providing authentication administration to the Authenticator. 2-02 10

General Topology EAPoL RADIUS Supplicant Authenticator Authentication Server 2-02 11

Authentication Process EAPoL RADIUS EAP Start Supplicant Authenticator Authentication Server EAP Request/Identity EAPoL EAP Response/Identity EAP Request EAP Response (cred.) RADIUS Access-Request RADIUS Access-Challenge RADIUS Access-Request RADIUS EAP Success! RADIUS Access-Accept ACCESS ALLOWED! 2-02 12

Why is Authentication So Important? The Obvious The Not So Obvious 2-02 13

The User Personalized Network - UPN Mass Customization of the application and information experience is the unavoidable trend and goal Past : www.yahoo.com Present : www.myyahoo.com Future : www.johnsmith.com or just John Smith Unfortunately your infrastructure has no idea of the persons using it We think falsely that we log into the network Infrastructure is not user personalized today A UPN is: A heterogeneous virtual enterprise connectivity system that Provides homogeneous services to people Based on their relation to the business 2-02 14

The Current Model To date, ships in the night The Network IP interface add 134.141.x.x/24 vlan blue IP route add static 134.141.130.x/24 ACL 100 IP permit 134.141.x.x 192.168.x.x any any VLAN create IP 134.141.x.x interface et.2.5,8 COO President CEO CFO 00-00-1d-08-04-67 VLAN QoS/ToS OSPF BGP IMTU 802.1x SNMP 134.141.x.x VOIP The Directory 12,073 Revenue (121,098) Utilities (1,23) IT budget (8,467) Gambling (101,601) Compensation (240) Restocking ========= ========== 2-02 XXX,XXX Net Income 15 The Business

Aligning IT with the Business Model The User Personalized Network understands who individual users of a network system, as well as their relationship to the business. UPN allows you to manage a user s relationship to the organization through the use of Profiling and Authentication. By configuring peoples access to services and information, a new paradigm is realized. Person = Behavior Intranet ERP Print Internet Net Admin Voice Mainframe Video Email IT Services Network Admin R&D Executive Sales Business Roles 2-02 16

4 Stages of the User Personalized Network Service Provisioning Authorization and Role assignment Authentication User Name & Credentials Profile Creation and Distribution RADIUS Server 2-02 17

The new IT/Business Model The Business rules are enforced by the network system President CEO The Directory COO CFO Increased Profitability Increased Customer Satisfaction Business Justified IT Expenditures Cost Reduction IT 2-02 18

Summary Understanding the Problem Is the Only Way to a Solution... The Problem: Aligning IT with the Business Securing Mission-Critical Data Deploying QoS,CoS Easily and in a Meaningful Way The Solution: Enterasys User Personalized Network Authentication John Roese (Enterasys CTO) co-authored the standard Role-Based Administration Role-Based Administration Innovation in software to match IT rules with business roles Service-Enabled Edge User Personalized Network Authentication Service-Enabled Edge Years of experience in architecting advanced features in our products. Person = Behavior 2-02 19

Realize your vision Thank You Visit us at: www.enterasys.com 2-02 20