1 © 2004 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Identity Based Networking Terena Rhodes, June 04 Eric Marin EMEA Consulting Engineer.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Network Security.
5.1 Overview of Network Access Protection What is Network Access Protection NAP Scenarios NAP Enforcement Methods NAP Platform Architecture NAP Architecture.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
1 © 2003, Cisco Systems, Inc. All rights reserved. Vyncke ethernet security Ethernet: Layer 2 Security Eric Vyncke Cisco Systems Distinguished Engineer.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
802.1x EAP Authentication Protocols
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Wireless Security with 802.1X Copyright 2005 Michael Griego This work is the intellectual property of the author. Permission is granted for this material.
802.1X in Windows Tom Rixom Alfa & Ariss. Overview 802.1X/EAP 802.1X in Windows Tunneled Authentication Certificates in Windows WIFI Client in Windows.
802.1x Port Authentication via RADIUS By Oswaldo Perdomo cs580 Network Security.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Network Security1 – Chapter 3 – Device Security (B) Security of major devices: How to protect the device against attacks aimed at compromising the device.
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID 802.1x OVERVIEW Sudhir Nath Product Manager, Trust.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
What about 802.1X? An overview of possibilities for safe access to fixed and wireless networks Amsterdam, October Erik Dobbelsteijn.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
© 2004, Cisco Systems, Inc. All rights reserved.
EID Cards and “Identity Based Networking Services” Because “Networks” are an integral part of the total solution. Walter Gillis Account Manager, for Flemish.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Ing. Peter Feciľak , KPI, FEI, TUKE.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Cisco’s Secure Access Control Server (ACS)
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Configuring Network Access Protection
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 8 Virtual LANs Cisco Networking Academy.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
7.4 Update - ISE Session.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
Networks and Security Great Demo
Port Based Network Access Control
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Implementing Network-Edge Security with 802.1x
Module 9: Configuring Network Access
Instructor Materials Chapter 6: VLANs
SECURING NETWORK TRAFFIC WITH IPSEC
Implementing Network Access Protection
802.1x OVERVIEW Sudhir Nath Product Manager, Trust & Identity
On and Off Premise Secure Access
Routing and Switching Essentials v6.0
Server-to-Client Remote Access and DirectAccess
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Computer Networks Protocols
What’s New In WatchGuard Wi-Fi Cloud v8.6
Presentation transcript:

1 © 2004 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Identity Based Networking Terena Rhodes, June 04 Eric Marin EMEA Consulting Engineer Cisco Systems

222 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Port-Based Network Authentication Have the client (a user or a device) request a service—in this case access to the network Verify the client’s claim of identity—authentication Reference the configured policies for the requesting client Grant or deny the services as per the policy— authorization

333 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS A Closer Look… Login Req. Actual Authentication Conversation Is between Client and Auth Server Using EAP; the Switch Is Just a Middleman, but Is Aware of What’s Going on Send CredentialsForward Credentials to ACS Server Authentication SuccessfulAccept 802.1x RADIUS Policy Instructions

444 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Agenda Protocols and Mechanisms behind 802.1x Identity-Based Policy Enforcement Understanding Microsoft Environments

555 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS IEEE 802.1x? Standard set by the IEEE working group— ratified in December of 2001 Designed to address and provide port-based access control using authentication Describes a standard link layer protocol used for transporting higher-level authentication protocols Actual enforcement is via MAC-based filtering and port state monitoring

666 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Some IEEE Terminology IEEE Terms Normal People Terms SupplicantClient AuthenticatorNetwork Access Device Authentication ServerAAA/RADIUS Server

777 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Current Prevalent Authentication Methods EAP-MD5: Uses MD5-based Challenge-Response for authentication EAP-TLS: Uses x.509 v3 PKI certificates and the TLS mechanism for authentication EAP-MSCHAPv2: Uses username/password MSCHAPv2 Challenge Response authentication LEAP: Uses username/password authentication PEAP: Protected EAP tunnel mode EAP encapsulator; tunnels other EAP types in an encrypted tunnel—much like web-based SSL EAP-TTLS: Other EAP methods over an extended EAP-TLS encrypted tunnel EAP-GTC: Generic token and OTP authentication

888 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Agenda Protocols and Mechanisms behind 802.1x Identity-Based Policy Enforcement Understanding Microsoft Environments

999 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS IBNS Features and Benefits Enhanced Port Based Access Control Greater flexibility and mobility for a stratified user community Enhanced User Productivity Added support for converged VoIP networks Centralized Management with AAA server Wireless Mobility with 802.1X and EAP Authentication Types Catalyst Switch Portfolio Basic 802.1X Support 802.1X with VLANs 802.1X with Port Security 802.1X with VVID 802.1X Guest VLANs 802.1X with ACLs

10 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Dynamic VLAN Assignment Dynamic VLAN assignment based on identity Allows VLAN assignment, by group, or individual, at the time of authentication VLANs assigned by name—allows for more flexible VLAN management Allows VLAN policies to be applied to groups of users (i.e., VLAN QoS, VLAN ACLs, etc.)

11 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Dynamic VLAN Mechanism RADIUS AV-Pairs used to send back VLAN configuration information to authenticator. AV-Pair usage for VLANs is IEEE specified in the 802.1x standard. AV-Pairs used – all are IETF standard: [64] Tunnel-Type – “VLAN” (13) [65] Tunnel-Medium-Type – “802” (6) [81] Tunnel-Private-Group-ID -

12 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS ACS Configuration Group Policy Configuration – VLAN Assignment

13 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Guest Access Guest clients do NOT have an 802.1x supplicant. This type of guest access is provided by the switch. If client does not respond to 802.1x auth requests before timeout, guest access will be applied. Default timeout is 30 seconds with 3 retries. Total timeout period is 90 secs by default. Login Request User has access to DMZ or “Quarantine” network. Switch applies policies and enables port. Login Request Authentication timeout. Retries expired. Client is not 802.1x capable. Put them in the quarantine zone! Set port VLAN to DMZ

14 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS IEEE 802.1x with Voice VLAN Problem – How to connect a PC (dot1x client) through an IP Phone (non-dot1x client) to a dot1x enabled switch port? Answer – Switch identifies IP Phone (as a Cisco phone) and bypasses dot1x authentication – BUT – still forces authentication for downstream device Radius Server Dot1x ClientNon Dot1x Client Dot1x port

15 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Example Configuration—ACL download

16 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS What is just around the corner … QoS Parameters The user will have their port assigned a particular QoS policy based on their login. Initially it will be one of several ‘templates’. Port Naming The port name in the switch’s CLI will be rewritten with the username used during login. This allows for simplified administration and accounting of LANs. Accounting The NAS Port info will be sent to the RADIUS server to tie a user to a physical location; A start / stop update will be used to determine user movement.

17 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Agenda Protocols and Mechanisms behind 802.1x Identity-Based Policy Enforcement Understanding Microsoft Environments

18 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Windows Boot Cycle Overview Power UpLoad NDIS drivers DHCPSetup Secure Channel to DC Update GPOsApply Computer GPOs Present GINA (Ctrl-Alt-Del) Login Inherent Assumption of Network Connectivity

19 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Windows Machine Authentication Power Up Load NDIS drivers DHCP Setup Secure Channel to DC Update GPOs Apply Computer GPOs Present GINA (Ctrl-Alt-Del) Login 802.1x Authenticate as Computer

20 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Microsoft and Machine Authentication What is Machine Authentication? The ability of a Windows workstation to authenticate under it’s own identity, independent of the requirement for an interactive user session What is it used for? Machine authentication is used at boot time by Windows OSes to authenticate and communicate with Windows Domain Controllers in order to pull down machine group policies Why do we care? Pre-802.1x this worked under the assumption that network connectivity was a given; post-802.1x the blocking of network access prior to 802.1x authentication breaks the machine-based group policy model—UNLESS the machine can authenticate using its own identity in 802.1x

21 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Different Modes of Authentication in Microsoft Environments Controlled by registry keys Authentication by machine only No need for user authentication if machine authentication is successful Authentication by user only No machine authentication taking place at all—be careful, this breaks group and system policies Authentication by user and machine Uses authentication of both user and machine; switches contexts when going from one to the other

22 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Microsoft Issues with DHCP DHCP is a parallel event, independent of 802.1x authentication With wired interfaces a successful 802.1x authentication DOES NOT force an DHCP address discovery (no media-connect signal) This produces a problem if not properly planned DHCP starts once interface comes up If 802.1x authentication takes too long, DHCP may time out… Host may also be put into a different VLAN upon 802.1X authentication

23 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS DHCP Timeout Problem Power Up Load NDIS Drivers DHCP Setup Secure Channel to DC Present GINA (Ctrl-Alt-Del) Login DHCP—Timeout at 62 Sec x Auth—Variable Timeout

24 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Microsoft Fixes Operation Login Req. At this point, DHCP proceeds normally. Send Credentials Forward Credentials to ACS Server Auth Successful (EAP-Success) Accept 802.1x RADIUS/DHCP VLAN Assignment Authentication Server Authenticator Supplicant ICMP echo (x3) for default gw from “old IP” as soon as EAP-Success frame is rcvd DHCP-Request (D= ) (after pings have gone unanswered) DHCP-NAK (wrong subnet) DHCP-Discover (D= )

25 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Conclusion Situation gets better and better on the supplicant side Authorization part of AAA gives IBN great extensibility 802.1X being deployed more & more on switches Also present on Cisco IOS routers combined with IPsec VPN access

26 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS 26 © 2002, Cisco Systems, Inc. All rights reserved. Questions?

27 © 2003 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS 27 © 2003, Cisco Systems, Inc. All rights reserved.