SlideShare a Scribd company logo
1 of 32
#ATM16
Securing the LAN: Best
Practices to Secure the
Wired Access Network
Micah Staggs, CSE-Security
Chuck Jenson, CSE-Security
March 2016 @ArubaNetworks |
2#ATM16
Agenda
Why the LAN?
Methodologies
Examples
Security
Demos
3#ATM16
HPE-Aruba
7XXX
Controllers
Soon to be
Retired Cisco
Switches
Why Bother With the LAN?
–Isn’t in “inside” my network?
–Increased mobility of company-
provided devices and the
introduction of user-owned devices
make trusting the endpoint an issue
–Cloud-first, Mobile-first thinking is
that the access layer isn’t truly
“inside”
–What’s the point, we are going to be
all wireless in a year anyway!
4#ATM16
Other Reasons
–Universal Port
–We’d like to have a similar
config on all ports and update
them based on the device
attached
–Static VLAN assignments
and changes can be a pain
–Security audits
5#ATM16
Methodologies – Port Security
–Locks the port to the 1st MAC or 2 that
it sees. Clears out after the port has
been down for some time
–Works well against someone trying to
unplug a printer and use that port, but
not really secure and not mobile
friendly
6#ATM16
Methodologies – MAC WhiteList
–MAC Lists are good for “Quick
and Dirty” Security
–Let’s face it, no one wants to
maintain an enterprise-wide list
of MAC addresses.
–What if a NIC gets changed?
–What about BYOD laptops?
–What about MAC spoofing?
7#ATM16
Methodologies – Wait and See
–Let it on the network and if it does
something wrong, or we detect the
device type, move it via SNMP.
(sometimes coupled with a MAC
list)
–Constant changing of port config
–What if you miss a syslog?
–SNMP writing doesn’t always scale
well in enterprise environments
8#ATM16
Methodologies – Captive Portal
–Works almost like a Guest Network.
1. Let them on in a temporary
fashion
2. Authenticate via Web Auth
3. Put them in the appropriate
VLAN/Role
–Not supported by all switches
–What happens to devices like
printers
and VoIP phones with no browser?
9#ATM16
Methodologies – 802.1X
–L2, authentication and enforcement
occurs prior to the device getting an IP.
Also works for Guests with supplicant
active
–Requires the supplicant be present and active on the endpoint
(not on by default on Windows)
–What about printers and phones and door locks, etc. with no
supplicants (headless)?
10#ATM16
What We Usually See
–802.1X, coupled with MAC Auth Bypass and Captive Portal
–Best if coupled with a profiler and/or other context sources
–Can be versatile enough to handle corporate, personal and guest
devices
Cisco:
interface GigabitEthernet<port-number>
switchport access vlan <vlan-id>
switchport mode access
authentication order dot1x mab
authentication priority dot1x mab
HPE:
11#ATM16
Sample .1X Transaction using Certificates (TLS)
–Mutual Authentication
Request Identity
Response Identity (anonymous) Response Identity
TLS Start
Certificate
Client Key exchange
Cert. verification
Request credentials
Response credentials
Success
EAPOL RADIUS
EAPOL Start
AuthenticationServer
Authenticator
Endpoint
12#ATM16
Sample .1X Transaction with Mac Auth Bypass and Captive
Portal
13#ATM16
What Context do we use?
–Who is the user?
–What type of device is it?
–Is it a company-owned or
user-owned device?
–What’s the time of day or
day of week?
–Location – can this device
attach to this port?
14#ATM16
Device
Profiling
• Samsung SM-G900
• Android
• “Jons-Galaxy”
EMM/MDM
• Personal owned
• Registered
• OS up-to-date
• Hansen, Jon [Sales]
• MDM enabled = true
• In-compliance = true
Identity
Stores
Network Devices
• Hansen, Jon [Sales]
• Title – COO
• Dept – Executive office
• City – London
• Location – Bldg 10
• Floor – 3
• Bandwidth – 10Mbps
Sources of Usable Device Context
15#ATM16
Enforcement Options
–Great, now that we know the who, what, when, and where… what
can we do?
–Depends on access device, but typically we see:
–VLAN Steering
–dACL enforcement
–Change of
Authorization
–Vendor specific
(User Role, AV Pair)
–Captive portals on
some switches
16#ATM16
Enforcement Options – Change of Authorization (CoA)
– The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an
authentication, authorization, and accounting (AAA) session after it is authenticated. When a policy
changes for a user in ClearPass, administrators can send the RADIUS CoA packets from the ClearPass
Policy Manager (CPPM) to reinitialize authentication and apply the new policy.
– RADIUS Change of Authorization will disconnect them allowing them to reconnect in the new VLAN
assigned in the policy.
– If CoA isn't available using short DHCP leases and short session timeouts are options.
17#ATM16
How to Handle “Headless” Devices
–For devices that do not support 802.1X:
–Need to use dynamic authentication/FlexAuth/MAB on
the port
–Two mechanisms for authentication:
–Device Profiler
–Device Registration
18#ATM16
MAC Spoofing
What if someone spoofs
a headless device’s
MAC address?
19#ATM16
ClearPass Can Detect Device Conflicts
20#ATM16
Endpoint Profiler
Authorize devices like IP Phones, Hand Scanners, Printers, or
Access Points
Protects your
users and
devices
21#ATM16
Profiling “Unknowns”
–Recommended Best Practice:
–Allow DHCP, SNMP, and maybe redirect HTTP to CPPM
–Once profiled, re-authenticate against new information
In the Demo, we will show how
to use a VLAN for profiling with
a short DHCP lease and
“bounce” the device to the
appropriate VLAN once they
are profiled
22#ATM16
Example Profiling Policy
Create an
enforcement
profile and policy
rule to send the
dACL
(in the case of,
say, a Cisco LAN
switch)
Protect your users and devices
23#ATM16
Device Registration
–ClearPass comes with a device registration feature that allows a specific device (MAC)
to be registered and authorized in the system.
–This allows a user to pre-register a device before bringing it onto the network.
– Thus creating an audit trail of the users devices
–Useful when a general category or OS family isn’t
–specific enough or when you need to only allow
specific devices.
–Example: We don’t want to authorize all Apple
MacBooks but we will allow some to be registered
and authorized
–Example: You are allowed 3 Personal Devices and
you need to add a new device and remove an old device
without having to call the helpdesk
24#ATM16
Device Registration Example
The default device
registration page
looks like this:
25#ATM16
Pulling it All Together
26#ATM16
Summary: What do we get?
–A single config we can use on all access ports
–With CPPM, a policy engine and profiler that can
provide consistency across multiple types of edge
devices
–Ability to react differently to different device types,
and provide needed access without having to default
to “full access”
27
Configs / Demos
28
Demo 1 – 802.1X Authentication with VLAN Switching
Valid
User?
User
Type?
Student
Guest
No
Yes
Faculty
HP-2920
Switch
(PEAP-
MSCHAPv2)ClearPass
Router
Access
Denied
VLAN 100
VLAN 600
VLAN 200
29
Demo 2 – Mac Auth Bypass with Device Profiling
HP-2920
Switch
(PEAP-
MSCHAPv2)
Device
Profiled?
Device
Type?
Access Point
Apple TV
No
Yes
Computer
ClearPass
Router
VLAN 400
VLAN 300
VLAN 200
Profiling
VLAN 700 with
short DHCP
Lease
30
Demo 3 – Wired Guest Portal
HP-2920
Switch
(PEAP-
MSCHAPv2)
Supplicant
Enabled? No
Yes
ClearPass
Router
Return to
Demo 1
Guest Portal
VLAN 200
31#ATM16
Join Aruba’s Titans of Tomorrow
force in the fight against network
mayhem. Find out what your
IT superpower is.
Share your results with friends
and receive a free superpower
t-shirt.
www.arubatitans.com
Thank you
staggs@hpe.com
cjenson@hpe.com

More Related Content

What's hot

What's hot (20)

Ready
ReadyReady
Ready
 
EMEA Airheads How licensing works in Aruba OS 8.x
EMEA Airheads  How licensing works in Aruba OS 8.xEMEA Airheads  How licensing works in Aruba OS 8.x
EMEA Airheads How licensing works in Aruba OS 8.x
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 
Aruba 802.11n Networks Validated Reference Design
Aruba 802.11n Networks Validated Reference DesignAruba 802.11n Networks Validated Reference Design
Aruba 802.11n Networks Validated Reference Design
 
Roaming behavior and Client Troubleshooting
Roaming behavior and Client TroubleshootingRoaming behavior and Client Troubleshooting
Roaming behavior and Client Troubleshooting
 
EMEA Airheads- ArubaOS - Cluster Manager
EMEA Airheads- ArubaOS - Cluster ManagerEMEA Airheads- ArubaOS - Cluster Manager
EMEA Airheads- ArubaOS - Cluster Manager
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
EMEA Airheads- Aruba Instant AP- VPN Troubleshooting
EMEA Airheads- Aruba Instant AP-  VPN TroubleshootingEMEA Airheads- Aruba Instant AP-  VPN Troubleshooting
EMEA Airheads- Aruba Instant AP- VPN Troubleshooting
 
Aruba Mobility Controllers
Aruba Mobility ControllersAruba Mobility Controllers
Aruba Mobility Controllers
 
Aruba Webinar - 1-29-15
Aruba Webinar - 1-29-15Aruba Webinar - 1-29-15
Aruba Webinar - 1-29-15
 
Advanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter laneAdvanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter lane
 
Base Designs Lab Setup for Validated Reference Design
Base Designs Lab Setup for Validated Reference DesignBase Designs Lab Setup for Validated Reference Design
Base Designs Lab Setup for Validated Reference Design
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
EMEA Airheads – Aruba controller features used to optimize performance
EMEA Airheads – Aruba controller features used to optimize performanceEMEA Airheads – Aruba controller features used to optimize performance
EMEA Airheads – Aruba controller features used to optimize performance
 
Access Management with Aruba ClearPass
Access Management with Aruba ClearPassAccess Management with Aruba ClearPass
Access Management with Aruba ClearPass
 
Useful cli commands v1
Useful cli commands v1Useful cli commands v1
Useful cli commands v1
 
BYOD with ClearPass
BYOD with ClearPassBYOD with ClearPass
BYOD with ClearPass
 
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice ConfigurationEMEA Airheads- Instant AP- Instant AP Best Practice Configuration
EMEA Airheads- Instant AP- Instant AP Best Practice Configuration
 
Aruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guideAruba instant 6.4.0.2 4.1 user guide
Aruba instant 6.4.0.2 4.1 user guide
 
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 

Similar to Securing the LAN Best practices to secure the wired access network

Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
paripec
 

Similar to Securing the LAN Best practices to secure the wired access network (20)

ClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirementsClearPass design scenarios that solve the toughest security policy requirements
ClearPass design scenarios that solve the toughest security policy requirements
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
 
Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...Mobile Experience Management and Network Services Health Check with Aruba Air...
Mobile Experience Management and Network Services Health Check with Aruba Air...
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
 
Getting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewallGetting the most out of the aruba policy enforcement firewall
Getting the most out of the aruba policy enforcement firewall
 
Hpe Intelligent Management Center
Hpe Intelligent Management CenterHpe Intelligent Management Center
Hpe Intelligent Management Center
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Securing management, control & data plane
Securing management, control & data planeSecuring management, control & data plane
Securing management, control & data plane
 
The Internet of things for integration people - UKCSUG - public version
The Internet of things for integration people - UKCSUG - public versionThe Internet of things for integration people - UKCSUG - public version
The Internet of things for integration people - UKCSUG - public version
 
Adapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear passAdapting to evolving user, security, and business needs with aruba clear pass
Adapting to evolving user, security, and business needs with aruba clear pass
 
Securing MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slidesSecuring MQTT - BuildingIoT 2016 slides
Securing MQTT - BuildingIoT 2016 slides
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
Banking and ATM networking reports
Banking and ATM networking reportsBanking and ATM networking reports
Banking and ATM networking reports
 
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig PortsOverview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
Overview of Major Aruba Switching Features incl. Smart Rate for Multi-Gig Ports
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing Scada Industrial Control Systems Penetration Testing
Scada Industrial Control Systems Penetration Testing
 
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
Penetrationtestingascadaindustrialcontrolsystems 141229233134-conversion-gate02
 
Opmanager technical overview
Opmanager technical overviewOpmanager technical overview
Opmanager technical overview
 

More from Aruba, a Hewlett Packard Enterprise company

More from Aruba, a Hewlett Packard Enterprise company (20)

EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
Introduction to AirWave 10
 
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
 
EMEA Airheads - Configuring different APIs in Aruba 8.x
EMEA Airheads - Configuring different APIs  in Aruba 8.x EMEA Airheads - Configuring different APIs  in Aruba 8.x
EMEA Airheads - Configuring different APIs in Aruba 8.x
 
Bringing up Aruba Mobility Master, Managed Device & Access Point
Bringing up Aruba Mobility Master, Managed Device & Access PointBringing up Aruba Mobility Master, Managed Device & Access Point
Bringing up Aruba Mobility Master, Managed Device & Access Point
 
EMEA Airheads- Aruba 8.x Architecture overview & UI Navigation
EMEA Airheads- Aruba 8.x Architecture overview & UI NavigationEMEA Airheads- Aruba 8.x Architecture overview & UI Navigation
EMEA Airheads- Aruba 8.x Architecture overview & UI Navigation
 
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
EMEA Airheads– Aruba Clarity. Because a Wi-Fi Problem's Often Not a "Wi-Fi" P...
 
EMEA Airheads- ClearPass extensions and how they can help
EMEA Airheads-  ClearPass extensions and how they can helpEMEA Airheads-  ClearPass extensions and how they can help
EMEA Airheads- ClearPass extensions and how they can help
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Securing the LAN Best practices to secure the wired access network

  • 1. #ATM16 Securing the LAN: Best Practices to Secure the Wired Access Network Micah Staggs, CSE-Security Chuck Jenson, CSE-Security March 2016 @ArubaNetworks |
  • 3. 3#ATM16 HPE-Aruba 7XXX Controllers Soon to be Retired Cisco Switches Why Bother With the LAN? –Isn’t in “inside” my network? –Increased mobility of company- provided devices and the introduction of user-owned devices make trusting the endpoint an issue –Cloud-first, Mobile-first thinking is that the access layer isn’t truly “inside” –What’s the point, we are going to be all wireless in a year anyway!
  • 4. 4#ATM16 Other Reasons –Universal Port –We’d like to have a similar config on all ports and update them based on the device attached –Static VLAN assignments and changes can be a pain –Security audits
  • 5. 5#ATM16 Methodologies – Port Security –Locks the port to the 1st MAC or 2 that it sees. Clears out after the port has been down for some time –Works well against someone trying to unplug a printer and use that port, but not really secure and not mobile friendly
  • 6. 6#ATM16 Methodologies – MAC WhiteList –MAC Lists are good for “Quick and Dirty” Security –Let’s face it, no one wants to maintain an enterprise-wide list of MAC addresses. –What if a NIC gets changed? –What about BYOD laptops? –What about MAC spoofing?
  • 7. 7#ATM16 Methodologies – Wait and See –Let it on the network and if it does something wrong, or we detect the device type, move it via SNMP. (sometimes coupled with a MAC list) –Constant changing of port config –What if you miss a syslog? –SNMP writing doesn’t always scale well in enterprise environments
  • 8. 8#ATM16 Methodologies – Captive Portal –Works almost like a Guest Network. 1. Let them on in a temporary fashion 2. Authenticate via Web Auth 3. Put them in the appropriate VLAN/Role –Not supported by all switches –What happens to devices like printers and VoIP phones with no browser?
  • 9. 9#ATM16 Methodologies – 802.1X –L2, authentication and enforcement occurs prior to the device getting an IP. Also works for Guests with supplicant active –Requires the supplicant be present and active on the endpoint (not on by default on Windows) –What about printers and phones and door locks, etc. with no supplicants (headless)?
  • 10. 10#ATM16 What We Usually See –802.1X, coupled with MAC Auth Bypass and Captive Portal –Best if coupled with a profiler and/or other context sources –Can be versatile enough to handle corporate, personal and guest devices Cisco: interface GigabitEthernet<port-number> switchport access vlan <vlan-id> switchport mode access authentication order dot1x mab authentication priority dot1x mab HPE:
  • 11. 11#ATM16 Sample .1X Transaction using Certificates (TLS) –Mutual Authentication Request Identity Response Identity (anonymous) Response Identity TLS Start Certificate Client Key exchange Cert. verification Request credentials Response credentials Success EAPOL RADIUS EAPOL Start AuthenticationServer Authenticator Endpoint
  • 12. 12#ATM16 Sample .1X Transaction with Mac Auth Bypass and Captive Portal
  • 13. 13#ATM16 What Context do we use? –Who is the user? –What type of device is it? –Is it a company-owned or user-owned device? –What’s the time of day or day of week? –Location – can this device attach to this port?
  • 14. 14#ATM16 Device Profiling • Samsung SM-G900 • Android • “Jons-Galaxy” EMM/MDM • Personal owned • Registered • OS up-to-date • Hansen, Jon [Sales] • MDM enabled = true • In-compliance = true Identity Stores Network Devices • Hansen, Jon [Sales] • Title – COO • Dept – Executive office • City – London • Location – Bldg 10 • Floor – 3 • Bandwidth – 10Mbps Sources of Usable Device Context
  • 15. 15#ATM16 Enforcement Options –Great, now that we know the who, what, when, and where… what can we do? –Depends on access device, but typically we see: –VLAN Steering –dACL enforcement –Change of Authorization –Vendor specific (User Role, AV Pair) –Captive portals on some switches
  • 16. 16#ATM16 Enforcement Options – Change of Authorization (CoA) – The RADIUS Change of Authorization (CoA) feature provides a mechanism to change the attributes of an authentication, authorization, and accounting (AAA) session after it is authenticated. When a policy changes for a user in ClearPass, administrators can send the RADIUS CoA packets from the ClearPass Policy Manager (CPPM) to reinitialize authentication and apply the new policy. – RADIUS Change of Authorization will disconnect them allowing them to reconnect in the new VLAN assigned in the policy. – If CoA isn't available using short DHCP leases and short session timeouts are options.
  • 17. 17#ATM16 How to Handle “Headless” Devices –For devices that do not support 802.1X: –Need to use dynamic authentication/FlexAuth/MAB on the port –Two mechanisms for authentication: –Device Profiler –Device Registration
  • 18. 18#ATM16 MAC Spoofing What if someone spoofs a headless device’s MAC address?
  • 19. 19#ATM16 ClearPass Can Detect Device Conflicts
  • 20. 20#ATM16 Endpoint Profiler Authorize devices like IP Phones, Hand Scanners, Printers, or Access Points Protects your users and devices
  • 21. 21#ATM16 Profiling “Unknowns” –Recommended Best Practice: –Allow DHCP, SNMP, and maybe redirect HTTP to CPPM –Once profiled, re-authenticate against new information In the Demo, we will show how to use a VLAN for profiling with a short DHCP lease and “bounce” the device to the appropriate VLAN once they are profiled
  • 22. 22#ATM16 Example Profiling Policy Create an enforcement profile and policy rule to send the dACL (in the case of, say, a Cisco LAN switch) Protect your users and devices
  • 23. 23#ATM16 Device Registration –ClearPass comes with a device registration feature that allows a specific device (MAC) to be registered and authorized in the system. –This allows a user to pre-register a device before bringing it onto the network. – Thus creating an audit trail of the users devices –Useful when a general category or OS family isn’t –specific enough or when you need to only allow specific devices. –Example: We don’t want to authorize all Apple MacBooks but we will allow some to be registered and authorized –Example: You are allowed 3 Personal Devices and you need to add a new device and remove an old device without having to call the helpdesk
  • 24. 24#ATM16 Device Registration Example The default device registration page looks like this:
  • 26. 26#ATM16 Summary: What do we get? –A single config we can use on all access ports –With CPPM, a policy engine and profiler that can provide consistency across multiple types of edge devices –Ability to react differently to different device types, and provide needed access without having to default to “full access”
  • 28. 28 Demo 1 – 802.1X Authentication with VLAN Switching Valid User? User Type? Student Guest No Yes Faculty HP-2920 Switch (PEAP- MSCHAPv2)ClearPass Router Access Denied VLAN 100 VLAN 600 VLAN 200
  • 29. 29 Demo 2 – Mac Auth Bypass with Device Profiling HP-2920 Switch (PEAP- MSCHAPv2) Device Profiled? Device Type? Access Point Apple TV No Yes Computer ClearPass Router VLAN 400 VLAN 300 VLAN 200 Profiling VLAN 700 with short DHCP Lease
  • 30. 30 Demo 3 – Wired Guest Portal HP-2920 Switch (PEAP- MSCHAPv2) Supplicant Enabled? No Yes ClearPass Router Return to Demo 1 Guest Portal VLAN 200
  • 31. 31#ATM16 Join Aruba’s Titans of Tomorrow force in the fight against network mayhem. Find out what your IT superpower is. Share your results with friends and receive a free superpower t-shirt. www.arubatitans.com

Editor's Notes

  1. Trivia Answer: There are 6 horses on the Agenda Page
  2. "Agree that the wired edge is shifting from access to wireless aggregation. In what tangible ways are we optimizing our Wired infrastructure for Wireless?" Here was my answer: 1) SOFTWARE - five points of integration with Aruba software to become better together: unified mgmt via Airwave supplemented by IMC; unified policy via ClearPass; ZTP same as APs via Activate or DHCP-based; cloud mgmt. via Aruba Central; and better-together features ported from the MAS switch like rogue AP detection and auto-setting PoE and QoS for an identified AP. 2) HARDWARE - best-in-class performance (throughput, switching, latency), full POE+ on every port, redundant power supplies for reliability, and of course #hpesmartrate for multi-gig to 11ac wave 2 APs. 3) ASIC - future-proof with best-in-class programmable ASIC, greatest scale and best performance for rule matching to enable real-time visibility, optimization and security services.
  3. Example: One customer thought their VoIP phones would be stationary until they found out that end users were moving them and then complaining because they would not authenticate on the new port.
  4. Trivia Answer: Wired Port Security is supported by HPE-Aruba, Cisco, Juniper (and others)
  5. Trivia Answer: The Authenticator initiates the Request Identity
  6. Trivia Answer: Device Profiling is one source of Usable Device Context
  7. Trivia Answer: A Headless Device is on that does not support 802.1X
  8. What if someone gets the MAC address of a printer or other authorized device and spoofs it on their PC? CPPM will set the Conflict flag on the Endpoint if the same MAC profiles as a different device than it previously had been. You can then act on that in the Enforcement Profile
  9. What if someone gets the MAC address of a printer or other authorized device and spoofs it on their PC? CPPM will set the Conflict flag on the Endpoint if the same MAC profiles as a different device than it previously had been. You can then act on that in the Enforcement Profile
  10. But what about new devices or devices that haven’t been profiled yet?
  11. Make networks mobility-defined instead of fixed
  12. Make networks mobility-defined instead of fixed
  13. Wired Guest has no supplicant and uses Guest Portal to be placed into VLAN 200
  14. Contest Overview - Aruba is running a marketing campaign where we ask “What is your IT superpower?” - Go to arubatitans.com to take a quick quiz to discover your superpower. - Share your results with friends and encourage others to play the game - Once you share, go to the Social and Community Hub, Gracia Commons, 3rd fl to pick up your free superpower shirt. FAQ 1. What do I have to do to get a shirt? Share your IT superpower results with friends and encourage them to play the game. Then come to the Social & Community Hub, 3rd Floor Gracia Commons to pick up your shirt. We just need your name and badge for verification. 2. Where do I get my shirt? Come to the #ATM16 Social & Community hub located at Gracia Commons on the 3rd Floor 3. Do I have to be at the event to get the shirt? Yes. You have to be at #ATM16 to get a shirt. 4. Can I get my colleague a shirt? He/she is in a session right now. Unfortunately not. We encourage your colleague to participate so that they can win a shirt for themselves. 5. Can I bring a shirt home for my colleague? Unfortunately not. You have to be at #ATM16 to get a shirt. 6. You don’t have a shirt in my size, can you ship the right size to me later? Unfortunately not. Please select the best size from our inventory on site.