Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.

Slides:



Advertisements
Similar presentations
Designing for Pervasive Network Security. Designing for Security Our aim in this section will be to concentrate on how campus Networks can be designed.
Advertisements

1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
Guide to Network Defense and Countermeasures Second Edition
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
 Category 6 Ethernet Cable, Single-mode Fiber Cable, and RJ45 Jacks  APC Netshelter SX 48U Racks and NetShelter AV Roof Fan Tray 825mm  Cisco 3800 ISR.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Team MAGIC Michael Gong Jake Kreider Chris Lugo Kwame Osafoh-Kintanka Wireless Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Lisa Farmer, Cedo Vicente, Eric Ahlm
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Wireless Network Security
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Topics 1.Security options and settings 2.Layer 2 vs. Layer 3 connection types 3.Advanced network and routing options 4.Local connections 5.Offline mode.
Payment Card Industry (PCI) Data Security Standard
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco NAC Luc Billot Security Consulting Engineer
Being Proactive with Computer Posture Assessment Department of Housing and Residence Education Charles Benjamin.
Wireless Network Security. Access Networks Core Networks The Current Internet: Connectivity and Processing Transit Net Private Peering NAP Public Peering.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
1 Network Admission Control to WLAN at WIT Presented by: Aidan McGrath B.Sc. M.A.
A Policy-based Approach to Wireless LAN Security Management George Lapiotis, Byungsuk Kim, Subir Das, Farooq Anjum Speaker: George Lapiotis
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Securing Wired Local Area Networks(LANs)
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Configuring Network Access Protection
Data Communications and Networks Chapter 10 – Network Hardware and Software ICT-BVF8.1- Data Communications and Network Trainer: Dr. Abbes Sebihi.
Wireless Intrusion Prevention System
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Computer networks Internet, Intranet, Extranet, Lan, Wan, characteristics and differences.
Chapter 9: Implementing the Cisco Adaptive Security Appliance
7.4 Update - ISE Session.
Copyright © 2008 Juniper Networks, Inc. 1 Juniper Networks Access Control Solutions Delivering Comprehensive and Manageable Network Access Control Solutions.
Wi-Fi Technology PRESENTED BY:- PRIYA AGRAWAL.
IS3220 Information Technology Infrastructure Security
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
So how to identify exactly who and what is on your network at any point in time? Andrew Noonan, SE ForeScout February 2015.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Intrusion Detection and Incidence Response Course Name – IT Intrusion Detection and Incidence.
IAUWS Implementing Advanced Cisco Unified Wireless Security (IAUWS) v CCNP Wireless It-Dumps.
Working at a Small-to-Medium Business or ISP – Chapter 8
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Securing the Network Perimeter with ISA 2004
Module 2: Configure Network Intrusion Detection and Prevention
Wireless Network Security
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Wireless Network Security
LM 5. Wireless Network Security
Presentation transcript:

Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi

Introduction ► Importance of Integrated Network Security  Example of disjointed solution  Example of properly integrated solution ► Importance to IT Leaders

Agenda ► Integrated Solution Architecture ► Integrated Solution Components  Cisco Security Agent (CSA)  Cisco NAC Appliance  Cisco Firewall  Cisco IPS  CS-MARS

Cisco Unified Wireless Network ► Anytime, anywhere access to information. ► Real-time access to instant messaging, , and network resources. ► Mobility services, such as voice, guest access, advanced security, and location. ► Modular architecture that supports n, a/b/g, and enterprise wireless mesh for indoor and outdoor locations, while ensuring a smooth migration path to future technologies and services

Secure Wireless Architecture ► The following five interconnected elements work together to deliver a unified enterprise-class wireless solution:  Client devices  Access points  Wireless controllers  Network management  Mobility services

Campus Architecture ► High availability ► Access services ► Application optimization and protection services ► Virtualization services ► Security services ► Operational and management services

Branch Architecture

Cisco Unified Wireless Network ► Anytime, anywhere access to information. ► Real-time access to instant messaging, , and network resources. ► Mobility services, such as voice, guest access, advanced security, and location. ► Modular architecture that supports n, a/b/g, and enterprise wireless mesh for indoor and outdoor locations, while ensuring a smooth migration path to future technologies and services

Agenda ► Integrated Solution Architecture ► Integrated Solution Components  Cisco Security Agent (CSA)  Cisco NAC Appliance  Cisco Firewall  Cisco IPS  CS-MARS

Where CSA Fits into Architecture

CSA ► CSA is an endpoint security solution ► Single agent that provides:  zero update attack protection  data loss prevention  signature based antivirus ► Two Components:  CSA MC  CSA

Need for CSA

Threats and CSA Mitigation

Prevent Wireless Ad hoc Communications Module ► If a wireless ad-hoc connection is active, all UDP or TCP traffic over any active wireless ad-hoc connection is denied, regardless of the application or IP address. ► Alerts are logged and reported any time the rule module is triggered ► Customization allows:  User Query  Test Deployment

Prevent Wireless if Ethernet Active Module ► If an Ethernet connection is active, all UDP or TCP traffic over any active wireless connection is denied, regardless of the application or IP address. ► An alert is logged and reported for each unique instance that the rule module is triggered. ► Supports customization  Customized user query as a rule action  Customized rule module based on location  Customized rule module in test mode

Location Aware Policy Enforcement ► Enforces different security policies based on the location of a mobile client ► Determines state of mobile client based on:  System state conditions  Network interface set characteristics ► CSA location-aware policy may leverage any of the standard CSA features

Roaming Force VPN Module ► If the CSA MC is not reachable and a network interface is active, all UDP or TCP traffic over any active interface is denied, regardless of the application or IP address, with the exception of web traffic, which is permitted for 300 seconds. ► Informs user that VPN connection is required ► Message is logged

Agenda ► Integrated Solution Architecture ► Integrated Solution Components  Cisco Security Agent (CSA)  Cisco NAC Appliance  Cisco Firewall  Cisco IPS  CS-MARS

Cisco NAC Appliance Overview ► Admission Control and compliance enforcement ► Features:  In-band or out-of-band deployment options  User authentication tools  Bandwidth and traffic filtering controls  Vulnerability assessment and remediation (also referred to as posture assessment)  Network Scan  Clean Access Agent

NAC Architecture

Out-of-Band Modes

In-Band Modes

NAC Appliance Positioning: Edge Deployment

NAC Appliance Positioning: Centralized Deployment

NAC Authentication ► 802.1x/EAP authentication does not pass through to NAC ► Authentication methods include:  Web authentication  Clean Access Agent  Single sign-on (SSO) with Clean Access Agent with the following:  VPN RADIUS accounting  Active Directory

Authentication Process: AD SSO

Posture Assessment Process

Remediation Process

Authenticated User

Agenda ► Integrated Solution Architecture ► Integrated Solution Components  Cisco Security Agent (CSA)  Cisco NAC Appliance  Cisco Firewall  Cisco IPS  CS-MARS

Firewall Placement Options Source: Cisco, Deploying Firewalls Throughout Your Organization

Why Placing Firewalls in Multiple Network Segments? ► Provide the first line of defense in network security infrastructures ► Prevent access breaches at all key network junctures ► Help organizations comply with the latest corporate and industry governance mandates  Sarbanes-Oxley (SOX)  Gramm-Leach-Bliley (GLB)  Health Insurance Portability and Accountability Act (HIPAA)  Payment Card Industry Data Security Standard (PCI DSS)

► Cisco Catalyst 6500 Wireless Services Module (WiSM) and Cisco Firewall Services Module (FWSM) ► Cisco Catalyst 6500 Wireless Services Module (WiSM) and Cisco Adaptive Security Appliances (ASA) ► 2100 family WLCs with a Cisco IOS firewall in an ISR router Firewall Integration

FWSM and ASA Modes of Operation Transparent Mode Routed Mode

High Availability Configuration ASA High Availability FWSM High Availability

WLC Deployments and IOS Firewall

Agenda ► Integrated Solution Architecture ► Integrated Solution Components  Cisco Security Agent (CSA)  Cisco NAC Appliance  Cisco Firewall  Cisco IPS  CS-MARS

IPS Threat Detection and Migration Roles

WLC and IPS Collaboration ► Cisco WLC and IPS synchronization ► WLC enforcement of a Cisco IPS host block ► Cisco IPS host block retraction

Example of WLC enforcement

Agenda ► Integrated Solution Architecture ► Integrated Solution Components  Cisco Security Agent (CSA)  Cisco NAC Appliance  Cisco Firewall  Cisco IPS  CS-MARS

CS-MARS ► Cisco Security Monitoring, Analysis and Reporting System ► Monitor the network ► Detect and correlate anomalies ► Mitigate threats

Cross-Network Anomaly Detection and Correlation ► MARS is configured to obtain the configurations of other network devices. ► Devices send events to MARS via SNMP. ► Anomalies are detected and correlated across all devices.

Monitoring, Anomalies, & Mitigation ► Discover Layer 3 devices on network  Entire network can be mapped  Find MAC addresses, end-points, topology ► Monitors wired and wireless devices  Unified monitoring provides complete picture ► Anomalies can be correlated  Complete view of anomalies (e.g. host names, MAC addresses, IP addresses, ports, etc.) ► Mitigation responses triggered using rules  Rules can be further customized to extend MARS

Reporting ► MARS provides reporting  Detected events (e.g. DoS, probes, etc.)  Distinguish between LAN and WLAN events  Leverage reporting from other components (e.g. WLC, WCS, etc.) ► Allows detailed analysis of  Events  Threats  Anomalies

Q & A