Holistic view of 802.1x integration & optimization

Holistic view of 802.1x
integration & optimization
High level design, with visual paradigm
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
What we will talk about
 Campus network in practice
 Security in practice
 802.1x, PEAP, EAP-TLS, EAP-FAST explained for campus network
 Policy based access control
 Network Admission Control (NAC)
 Introducing NAC appliance
 Secure network design with NAC for LAN & WLAN network
 Device profiling, posture check, guest redirection explained
 A case study scenario.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
We will not talk about
 Network design (routing, switching, WAN technologies)
 Network Quality of Service for routing & switching
 Basic WLAN infrastructure design.
 Not going to discus network design models in details.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Campus Area Network (CAN)
 Network consists of switch, router, firewall.
 Network infrastructure is owned and operated by the organization itself.
 CAN is ranged within 1KM to 5KM of area.
 Users within the network are free to use network resources once they are within the
campus parameter.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
CAN Pros & Cons
Advantages
 Easy build and maintenance.
 Open to all, personal hand-held device or laptops.
 Easy share and storage of resources within network and access from anywhere within the
network.
 Network resources stays within network and firewalled from external threat.
 Users uses secure login (SSO i.e. Shibbolet) technology to access resources within network.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Disadvantages
 Identity can be tempered. Such way unauthorized users with right user credential can
have access to unauthorized resource location resides within the network while the system
knows the resources are accessed by authorized person.
 User right within the entire network says same regardless which device the user using or
from which network location the user is coming from.
 Transparent to any firewall / IPS / IDS appliance.
 Device authorization scope is so limited and not dynamic.
 Management is slow and authentication / authorization events are not transparent to
network administrator.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
CAN Pros & Cons
 Identity loss or unauthorized access (using valid credential) are never
detected if the intruder don’t do any harm to resources.
 Authorized users can access network resources using any devices
supports local network based authentication / SSO (i.e. AD,
OpenLDAP, Shibbolet, OTP, RADIUS).
 Any devices can access network even if the device is not security
compliant (i.e. Non-updated patch, AV definition, Application)
 Guest management is painful. Guest access to the network needs
network administrator extra effort and time for managing new
network.
 Device isolation for service is complicated.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
CAN Pros & Cons
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
CAN security in practice
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
IPS /IDS
PBR
External
Threat
prevention
Zone
based
Firewall
AD, OTP,
openLDAP,
RSA Token
System
hardening
Internal
Threat
prevention
DLP,
awareness
CAN proposed
network security
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Identity Service
Engine Core
Network
Security
LAN
Network
VPN
Access
Identity
source
External
RADIUS
External
MDM
Wireless
network
Switched
network
AD
Mobility
Services
Agent
less
Agent
based
OTP
Internal
CA
WLAN
Controller Lite AP
AP
CAN proposed security features
Features
Device
profiling
Automatic Manual
BYOD
Device
registration
redirection
Dynamic
profile
allocation
TLS
handshake
Posture
check
Posture
profiling
Posture
object
Dynamic
access
control
MAB
Policy
based
802.1x
Guest
redirection
User
/device
redirection
Guest
mgmt.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Authentication method explained
 MAC Authentication Bypass
Method of excluding MAC addresses for 802.1x authentication process when its detected in a 802.1x
enabled port.
 802.1x based authentication
Method of forwarding 802.1x request to Identity Source server (AD, openLDAP etc.) through Access
Server.
**NAD devices (Switch, Router, Firewall, virtual network devices) establish communication using pre-
shared key prior to establish 802.1x request to Access server.
Access server collect all authentication requests and forwards accordingly.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Protocols for authentication
 RADIUS
 PEAP or Protected Extensible Authentication Protocol
 EAP-TLS or certificate based authentication.
 EAP-FAST to carry both TLS and non-TLS authentication.
Inner methods
 MSCHAPv2, MSCHAP, MD5
 TLS
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
802.1x components configuration
 802.1x server or Access Server needs to add switches / Wireless controller with pre-shared
key defined.
 Switch port 802.1x enablement
 Switch /Wireless controller to contact with Access Server using pre-shared key.
 Dynamic authorization enablement (if supported by NAD devices).
 User PC / Server or VM needs to be 802.1x supplicant (Windows, Linux built-in or third-party
supplicant like CISCO Anyconnect) enabled.
 Finally correspondent rules for 802.1x authentication & authorization.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
MAB configuration components
 Access server configuration for 802.1x exception
 Switch port MAB enablement configuration
 Open SSIDs in WLAN to be configured for MAB for guest redirection.
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Policy based dynamic access
 Can be achieved using Microsoft NPS (No posture, device profiling, MDM integration,
BYOD, Needs windows server 2K8 and 2K12 enterprise licensed)
 Can be achieved using CISCO ISE. (Licensed product. Needs feature unlock license).
 Can be achieved using OpenNAC (open-source, No posture)
 Can be achieved using PakcketFence. (open-source, supports almost everything)
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Dynamic NAC process
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Failover
? Learn MAC
Start IEEE 802.1x
IEEE 802.1x
Fails
Retries
Exceeded
?
MAB
configured
MAB
configured
?
MAB
Pass?
Web-Auth
?
Auth Fail ?
Auth-Fail VLAN
Restart Timer
Restart Time
Expire
Quite Period
Expire
No Access
Web-Auth
Passed
Web-Authorization MAB Authorization
Y
N
N
Y
Y Y
N
N
Y
N
N
Y
Y
Implementation summary
 Deploying AD with domain name “bdnog2016.org”. (Optional)
 Deploying Certificate server (Microsoft CA, Entrust CA, OpenSSL etc.) (Optional)
 Deploying external RADIUS server. (Optional)
 Deploying OTP server (Optional)
 Deploying Identity Service Solution (ISE, Open-NAC or PacketFence). (mandatory)
 Select supported NAD device. Cisco WS-C2960+24PC-L is ideal for this operation. We can
also select Dell Force10 switches, PowerConnect specific models.
 Using wireless controller (Cisco WLC, ARUBA, Chillispot for dwrt based AP Etc.)
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
CASE STUDY SCENARIO: ISE
DISCUSSION ON A STUDTY THAT ALREADY BEEN IMPLEMENTED AND FUNCTIONAL IN ONE OF THE
LARGEST NGOs IN BANGLADESH WITHIN ALL 87 BRANCHES CONNECTED USING MPLS BACKBONE
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Solution High Level Design
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Placement in network
 Recommended to deploy in server zone. Not necessary to deploy in DMZ as the service
will be used by users within the organization.
 Must have secure firewall policies that will permit only the ports needed for 802.1x, RADIUS,
Wep-Portal Redirection & Posture redirection
 Wireless LAN Controller can be placed on L2 network or L3 network (Use FQDN broadcast
using the enterprise Domain-Controller).
 All NAD devices (Switches, Firewall, Wireless LAN Controller should be able to
communicate with both ISE servers).
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Advance placement issues
 Do not place the ISE or NAC servers in Access Zone.
 Try to create separate zone for the ease of policing and security issue mitigation.
 If used de-centralized DHCP broadcast (in case of L3 MPLS) try Flex-Connect option at the
branch AP.
 Use Flex-ACL, AP-Group policy to make management easy and to ensure session control
for web-redirection (Avoid 500 Internal Error)
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
NAD configuration (Switch)
 Switch-Global configuration
 -----------------------------
 Switch(config)# aaa new-model
 Switch(config)# radius-server host 10.10.2.250
 Switch(config)# radius-server key <mykey>
 Switch(config)# aaa authentication dot1x default group radius local
 Switch(config)# dot1x system-auth-control
 Switch(config)# aaa authorization network default group radius
 Switch(config)# radius-server vsa send authentication
 Switch(config)# radius-server attribute 6 on-for-login-auth
 Switch(config)# radius-server attribute 8 include-in-access-req
 Switch(config)# radius-server attribute 25 access-request include
 Switch(config)# radius-server vsa send accounting
 Switch(config)# radius-server vsa send authentication
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
 Port Configuration
 ------------------------------
 Switch(config-if)# switchport mode access
 Switch(config-if)# authentication event fail action next-method
 Switch(config-if)# authentication event server dead action authorize
vlan 10
 Switch(config-if)# authentication event server alive action reinitialze
 Switch(config-if)# authentication host-mode multi-auth
 Switch(config-if)# authentication closed
 Switch(config-if)# authentication port-control auto
 Switch(config-if)# authentication violation restrict
 Switch(config-if)# ip device tracking
 Switch(config-if)# dot1x pae authenticator
 Switch(config-if)# spanning-tree portfast
NAD Configuration (WLC)
 Remote AP should be in flex-connect mode.
 Permit & Deny ACL should be configured on WLC, must be pointed at ISE under policy to
dynamically allocate for wireless users.
 Redirection ACL should be configured on WLC (For flex AP, ACL will be FLEX-ACL while
similar empty ACL will be in Normal ACL).
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
Enjoy 802.1x
Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
1 of 25

Recommended

Real-world 802.1X Deployment Challenges by
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesAruba, a Hewlett Packard Enterprise company
8.5K views44 slides
Top 10 tips_aruba_tac_madison lee by
Top 10 tips_aruba_tac_madison leeTop 10 tips_aruba_tac_madison lee
Top 10 tips_aruba_tac_madison leeAruba, a Hewlett Packard Enterprise company
2.9K views27 slides
A-to-Z design guide for the all-wireless workplace by
A-to-Z design guide for the all-wireless workplaceA-to-Z design guide for the all-wireless workplace
A-to-Z design guide for the all-wireless workplaceAruba, a Hewlett Packard Enterprise company
8.6K views30 slides
2012 ah vegas wlan design fundamentals by
2012 ah vegas   wlan design fundamentals2012 ah vegas   wlan design fundamentals
2012 ah vegas wlan design fundamentalsAruba, a Hewlett Packard Enterprise company
4.4K views36 slides
Connect and protect building a trust based internet of things for business cr... by
Connect and protect building a trust based internet of things for business cr...Connect and protect building a trust based internet of things for business cr...
Connect and protect building a trust based internet of things for business cr...Aruba, a Hewlett Packard Enterprise company
1.3K views30 slides

More Related Content

What's hot

Byod and guest access workshop enabling byod carlos gomez gallego_network ser... by
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Aruba, a Hewlett Packard Enterprise company
5.7K views43 slides
Shanghai Breakout: Access Management with Aruba ClearPass by
Shanghai Breakout: Access Management with Aruba ClearPassShanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPassAruba, a Hewlett Packard Enterprise company
1.4K views34 slides
2012 ah vegas unified access fundamentals by
2012 ah vegas   unified access fundamentals2012 ah vegas   unified access fundamentals
2012 ah vegas unified access fundamentalsAruba, a Hewlett Packard Enterprise company
1.2K views19 slides
Aruba ClearPass Exchange Deep Dive by
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba, a Hewlett Packard Enterprise company
4.2K views42 slides
Access Management with Aruba ClearPass #AirheadsConf Italy by
Access Management with Aruba ClearPass #AirheadsConf ItalyAccess Management with Aruba ClearPass #AirheadsConf Italy
Access Management with Aruba ClearPass #AirheadsConf ItalyAruba, a Hewlett Packard Enterprise company
2.3K views57 slides

What's hot(20)

Viewers also liked

Case study of Bangladesh IPv6 deployment by
Case study of Bangladesh IPv6 deployment Case study of Bangladesh IPv6 deployment
Case study of Bangladesh IPv6 deployment Bangladesh Network Operators Group
1.1K views25 slides
VoLTE: New horizon for voice revenue by
VoLTE: New horizon for voice revenueVoLTE: New horizon for voice revenue
VoLTE: New horizon for voice revenueBangladesh Network Operators Group
1.4K views22 slides
Go with the Flow by
Go with the Flow Go with the Flow
Go with the Flow Bangladesh Network Operators Group
1.1K views27 slides
APNIC Service Improvements 2015 by
APNIC Service Improvements 2015APNIC Service Improvements 2015
APNIC Service Improvements 2015Bangladesh Network Operators Group
680 views28 slides

Viewers also liked(20)

Similar to Holistic view of 802.1x integration & optimization

Manjesh cv by
Manjesh cvManjesh cv
Manjesh cvManjesh N
58 views4 slides
Aerohive BR100 Branch Router by
Aerohive BR100 Branch RouterAerohive BR100 Branch Router
Aerohive BR100 Branch RouterAerohive Networks
871 views2 slides
Easy Provisioning with GainSpan Embedded Wi-Fi Technology by
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technologygainspan
1.6K views16 slides
A modern approach to safeguarding your ICS and SCADA systems by
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systemsAlane Moran
299 views29 slides
ISE_2.1_BDM_v3a.pptx by
ISE_2.1_BDM_v3a.pptxISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptxYaser330700
35 views28 slides
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730 by
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Netgear Italia
839 views28 slides

Similar to Holistic view of 802.1x integration & optimization(20)

Easy Provisioning with GainSpan Embedded Wi-Fi Technology by gainspan
Easy Provisioning with GainSpan Embedded Wi-Fi TechnologyEasy Provisioning with GainSpan Embedded Wi-Fi Technology
Easy Provisioning with GainSpan Embedded Wi-Fi Technology
gainspan1.6K views
A modern approach to safeguarding your ICS and SCADA systems by Alane Moran
A modern approach to safeguarding your ICS and SCADA systemsA modern approach to safeguarding your ICS and SCADA systems
A modern approach to safeguarding your ICS and SCADA systems
Alane Moran299 views
ISE_2.1_BDM_v3a.pptx by Yaser330700
ISE_2.1_BDM_v3a.pptxISE_2.1_BDM_v3a.pptx
ISE_2.1_BDM_v3a.pptx
Yaser33070035 views
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730 by Netgear Italia
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Webinar NETGEAR - Nuovi AP Professionali Prosafe WAC720 e WAC730
Netgear Italia839 views
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you by Cisco Canada
Cisco Connect Halifax 2018   Cisco Meraki -let simple work for youCisco Connect Halifax 2018   Cisco Meraki -let simple work for you
Cisco Connect Halifax 2018 Cisco Meraki -let simple work for you
Cisco Canada280 views
Meraki powered services bell by Cisco Canada
Meraki powered services   bellMeraki powered services   bell
Meraki powered services bell
Cisco Canada1.8K views
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX by ssuser5824cf
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
ssuser5824cf821 views
Mobile Device Security by John Rhoton
Mobile Device SecurityMobile Device Security
Mobile Device Security
John Rhoton1.1K views
Managing Student Devices on the School Wireless Network by SecurEdgeNetworks
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
SecurEdgeNetworks1.5K views

More from Bangladesh Network Operators Group

IPv6 Deployment in South Asia 2022 by
IPv6 Deployment in South Asia  2022IPv6 Deployment in South Asia  2022
IPv6 Deployment in South Asia 2022Bangladesh Network Operators Group
43 views20 slides
Introduction to Software Defined Networking (SDN) by
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Bangladesh Network Operators Group
143 views27 slides
RPKI Deployment Status in Bangladesh by
RPKI Deployment Status in BangladeshRPKI Deployment Status in Bangladesh
RPKI Deployment Status in BangladeshBangladesh Network Operators Group
45 views21 slides
An Overview about open UDP Services by
An Overview about open UDP ServicesAn Overview about open UDP Services
An Overview about open UDP ServicesBangladesh Network Operators Group
217 views15 slides
12 Years in DNS Security As a Defender by
12 Years in DNS Security As a Defender12 Years in DNS Security As a Defender
12 Years in DNS Security As a DefenderBangladesh Network Operators Group
111 views21 slides
Contents Localization Initiatives to get better User Experience by
Contents Localization Initiatives to get better User ExperienceContents Localization Initiatives to get better User Experience
Contents Localization Initiatives to get better User ExperienceBangladesh Network Operators Group
78 views31 slides

More from Bangladesh Network Operators Group(20)

Recently uploaded

cis5-Project-11a-Harry Lai by
cis5-Project-11a-Harry Laicis5-Project-11a-Harry Lai
cis5-Project-11a-Harry Laiharrylai126
9 views11 slides
40th TWNIC Open Policy Meeting: APNIC PDP update by
40th TWNIC Open Policy Meeting: APNIC PDP update40th TWNIC Open Policy Meeting: APNIC PDP update
40th TWNIC Open Policy Meeting: APNIC PDP updateAPNIC
106 views20 slides
hamro digital logics.pptx by
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
11 views36 slides
ARNAB12.pdf by
ARNAB12.pdfARNAB12.pdf
ARNAB12.pdfArnabChakraborty499766
5 views83 slides
The Boys – Season 4 by
The Boys – Season 4The Boys – Season 4
The Boys – Season 4phamthebach2210
7 views2 slides
Liberando a produccion con confidencia.pdf by
Liberando a produccion con confidencia.pdfLiberando a produccion con confidencia.pdf
Liberando a produccion con confidencia.pdfAndres Almiray
6 views49 slides

Recently uploaded(15)

cis5-Project-11a-Harry Lai by harrylai126
cis5-Project-11a-Harry Laicis5-Project-11a-Harry Lai
cis5-Project-11a-Harry Lai
harrylai1269 views
40th TWNIC Open Policy Meeting: APNIC PDP update by APNIC
40th TWNIC Open Policy Meeting: APNIC PDP update40th TWNIC Open Policy Meeting: APNIC PDP update
40th TWNIC Open Policy Meeting: APNIC PDP update
APNIC106 views
Liberando a produccion con confidencia.pdf by Andres Almiray
Liberando a produccion con confidencia.pdfLiberando a produccion con confidencia.pdf
Liberando a produccion con confidencia.pdf
Andres Almiray6 views
WITS Deck by W.I.T.S.
WITS DeckWITS Deck
WITS Deck
W.I.T.S.36 views
Penetration Testing for Cybersecurity Professionals by 211 Check
Penetration Testing for Cybersecurity ProfessionalsPenetration Testing for Cybersecurity Professionals
Penetration Testing for Cybersecurity Professionals
211 Check49 views
Cracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptx by LeasedLinesQuote
Cracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptxCracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptx
Cracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptx
The Dark Web : Hidden Services by Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh22 views
40th TWNIC OPM: On LEOs (Low Earth Orbits) and Starlink Download by APNIC
40th TWNIC OPM: On LEOs (Low Earth Orbits) and Starlink Download40th TWNIC OPM: On LEOs (Low Earth Orbits) and Starlink Download
40th TWNIC OPM: On LEOs (Low Earth Orbits) and Starlink Download
APNIC112 views
ATPMOUSE_융합2조.pptx by kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 views
40th TWNIC Open Policy Meeting: A quick look at QUIC by APNIC
40th TWNIC Open Policy Meeting: A quick look at QUIC40th TWNIC Open Policy Meeting: A quick look at QUIC
40th TWNIC Open Policy Meeting: A quick look at QUIC
APNIC109 views

Holistic view of 802.1x integration & optimization

  • 1. Holistic view of 802.1x integration & optimization High level design, with visual paradigm Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 2. What we will talk about  Campus network in practice  Security in practice  802.1x, PEAP, EAP-TLS, EAP-FAST explained for campus network  Policy based access control  Network Admission Control (NAC)  Introducing NAC appliance  Secure network design with NAC for LAN & WLAN network  Device profiling, posture check, guest redirection explained  A case study scenario. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 3. We will not talk about  Network design (routing, switching, WAN technologies)  Network Quality of Service for routing & switching  Basic WLAN infrastructure design.  Not going to discus network design models in details. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 4. Campus Area Network (CAN)  Network consists of switch, router, firewall.  Network infrastructure is owned and operated by the organization itself.  CAN is ranged within 1KM to 5KM of area.  Users within the network are free to use network resources once they are within the campus parameter. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 5. CAN Pros & Cons Advantages  Easy build and maintenance.  Open to all, personal hand-held device or laptops.  Easy share and storage of resources within network and access from anywhere within the network.  Network resources stays within network and firewalled from external threat.  Users uses secure login (SSO i.e. Shibbolet) technology to access resources within network. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 6. Disadvantages  Identity can be tempered. Such way unauthorized users with right user credential can have access to unauthorized resource location resides within the network while the system knows the resources are accessed by authorized person.  User right within the entire network says same regardless which device the user using or from which network location the user is coming from.  Transparent to any firewall / IPS / IDS appliance.  Device authorization scope is so limited and not dynamic.  Management is slow and authentication / authorization events are not transparent to network administrator. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308 CAN Pros & Cons
  • 7.  Identity loss or unauthorized access (using valid credential) are never detected if the intruder don’t do any harm to resources.  Authorized users can access network resources using any devices supports local network based authentication / SSO (i.e. AD, OpenLDAP, Shibbolet, OTP, RADIUS).  Any devices can access network even if the device is not security compliant (i.e. Non-updated patch, AV definition, Application)  Guest management is painful. Guest access to the network needs network administrator extra effort and time for managing new network.  Device isolation for service is complicated. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308 CAN Pros & Cons
  • 8. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 9. CAN security in practice Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308 IPS /IDS PBR External Threat prevention Zone based Firewall AD, OTP, openLDAP, RSA Token System hardening Internal Threat prevention DLP, awareness
  • 10. CAN proposed network security Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308 Identity Service Engine Core Network Security LAN Network VPN Access Identity source External RADIUS External MDM Wireless network Switched network AD Mobility Services Agent less Agent based OTP Internal CA WLAN Controller Lite AP AP
  • 11. CAN proposed security features Features Device profiling Automatic Manual BYOD Device registration redirection Dynamic profile allocation TLS handshake Posture check Posture profiling Posture object Dynamic access control MAB Policy based 802.1x Guest redirection User /device redirection Guest mgmt. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 12. Authentication method explained  MAC Authentication Bypass Method of excluding MAC addresses for 802.1x authentication process when its detected in a 802.1x enabled port.  802.1x based authentication Method of forwarding 802.1x request to Identity Source server (AD, openLDAP etc.) through Access Server. **NAD devices (Switch, Router, Firewall, virtual network devices) establish communication using pre- shared key prior to establish 802.1x request to Access server. Access server collect all authentication requests and forwards accordingly. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 13. Protocols for authentication  RADIUS  PEAP or Protected Extensible Authentication Protocol  EAP-TLS or certificate based authentication.  EAP-FAST to carry both TLS and non-TLS authentication. Inner methods  MSCHAPv2, MSCHAP, MD5  TLS Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 14. 802.1x components configuration  802.1x server or Access Server needs to add switches / Wireless controller with pre-shared key defined.  Switch port 802.1x enablement  Switch /Wireless controller to contact with Access Server using pre-shared key.  Dynamic authorization enablement (if supported by NAD devices).  User PC / Server or VM needs to be 802.1x supplicant (Windows, Linux built-in or third-party supplicant like CISCO Anyconnect) enabled.  Finally correspondent rules for 802.1x authentication & authorization. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 15. MAB configuration components  Access server configuration for 802.1x exception  Switch port MAB enablement configuration  Open SSIDs in WLAN to be configured for MAB for guest redirection. Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 16. Policy based dynamic access  Can be achieved using Microsoft NPS (No posture, device profiling, MDM integration, BYOD, Needs windows server 2K8 and 2K12 enterprise licensed)  Can be achieved using CISCO ISE. (Licensed product. Needs feature unlock license).  Can be achieved using OpenNAC (open-source, No posture)  Can be achieved using PakcketFence. (open-source, supports almost everything) Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 17. Dynamic NAC process Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308 Failover ? Learn MAC Start IEEE 802.1x IEEE 802.1x Fails Retries Exceeded ? MAB configured MAB configured ? MAB Pass? Web-Auth ? Auth Fail ? Auth-Fail VLAN Restart Timer Restart Time Expire Quite Period Expire No Access Web-Auth Passed Web-Authorization MAB Authorization Y N N Y Y Y N N Y N N Y Y
  • 18. Implementation summary  Deploying AD with domain name “bdnog2016.org”. (Optional)  Deploying Certificate server (Microsoft CA, Entrust CA, OpenSSL etc.) (Optional)  Deploying external RADIUS server. (Optional)  Deploying OTP server (Optional)  Deploying Identity Service Solution (ISE, Open-NAC or PacketFence). (mandatory)  Select supported NAD device. Cisco WS-C2960+24PC-L is ideal for this operation. We can also select Dell Force10 switches, PowerConnect specific models.  Using wireless controller (Cisco WLC, ARUBA, Chillispot for dwrt based AP Etc.) Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 19. CASE STUDY SCENARIO: ISE DISCUSSION ON A STUDTY THAT ALREADY BEEN IMPLEMENTED AND FUNCTIONAL IN ONE OF THE LARGEST NGOs IN BANGLADESH WITHIN ALL 87 BRANCHES CONNECTED USING MPLS BACKBONE Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 20. Solution High Level Design Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 21. Placement in network  Recommended to deploy in server zone. Not necessary to deploy in DMZ as the service will be used by users within the organization.  Must have secure firewall policies that will permit only the ports needed for 802.1x, RADIUS, Wep-Portal Redirection & Posture redirection  Wireless LAN Controller can be placed on L2 network or L3 network (Use FQDN broadcast using the enterprise Domain-Controller).  All NAD devices (Switches, Firewall, Wireless LAN Controller should be able to communicate with both ISE servers). Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 22. Advance placement issues  Do not place the ISE or NAC servers in Access Zone.  Try to create separate zone for the ease of policing and security issue mitigation.  If used de-centralized DHCP broadcast (in case of L3 MPLS) try Flex-Connect option at the branch AP.  Use Flex-ACL, AP-Group policy to make management easy and to ensure session control for web-redirection (Avoid 500 Internal Error) Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 23. NAD configuration (Switch)  Switch-Global configuration  -----------------------------  Switch(config)# aaa new-model  Switch(config)# radius-server host 10.10.2.250  Switch(config)# radius-server key <mykey>  Switch(config)# aaa authentication dot1x default group radius local  Switch(config)# dot1x system-auth-control  Switch(config)# aaa authorization network default group radius  Switch(config)# radius-server vsa send authentication  Switch(config)# radius-server attribute 6 on-for-login-auth  Switch(config)# radius-server attribute 8 include-in-access-req  Switch(config)# radius-server attribute 25 access-request include  Switch(config)# radius-server vsa send accounting  Switch(config)# radius-server vsa send authentication Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308  Port Configuration  ------------------------------  Switch(config-if)# switchport mode access  Switch(config-if)# authentication event fail action next-method  Switch(config-if)# authentication event server dead action authorize vlan 10  Switch(config-if)# authentication event server alive action reinitialze  Switch(config-if)# authentication host-mode multi-auth  Switch(config-if)# authentication closed  Switch(config-if)# authentication port-control auto  Switch(config-if)# authentication violation restrict  Switch(config-if)# ip device tracking  Switch(config-if)# dot1x pae authenticator  Switch(config-if)# spanning-tree portfast
  • 24. NAD Configuration (WLC)  Remote AP should be in flex-connect mode.  Permit & Deny ACL should be configured on WLC, must be pointed at ISE under policy to dynamically allocate for wireless users.  Redirection ACL should be configured on WLC (For flex AP, ACL will be FLEX-ACL while similar empty ACL will be in Normal ACL). Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308
  • 25. Enjoy 802.1x Presentation by: Faisal Md Abdur Rahman, BDPEER | faisal.rahman@bdpeer.com | www.bdpeer.com Phone: +8801687477308