SlideShare a Scribd company logo
NAC & SDN
: about flowNAC with traffic flow
김준호
2015.09.23
Mobile Convergence LAB,
Department of Computer Engineering,
Kyung Hee University.
1. About paper & terms
2. FlowNAC
3. NAC & SDN
4. Intrusion Prevention
5. Q&A
Contents
About paper & terms
FlowNAC : Flow-based Network Access Control Conference
2014 Third European Workshop
on Software-Defined Networks
2014 Spain
Toward an SDN-Enabled NFV Architecture Magazine
IEEE Communications Magazine
: April 2015
2015 Spain
An Extended SDN Architecture for Network
Function Virtualization with a Case Study
on Intrusion Prevention
Magazine IEEE Network May/June 2015 2015 Taiwan
1. IEEE 802.1X
- port-based network access control(PNAC)에 관한 IEEE의 표준
- 유선 or 무선랜에 연결하고자 하는 장치에 대한 인증 메커니즘을 설명(Layer 2)
2. Granularity (입도 – 암석을 이루고 있는 광물 입자 크기)
A. Fine-grained – 결이 고운(세부적인 기능으로 나뉘어 있는)
B. Coarse-grained – 결이 거친(큰 기능으로 나뉘어 있는)
3. Proactive <-> Reactive
A. 앞서 주도하는 <-> 반응을 보이는
4. AAA
A. Authentication - 인증
B. Authorization – 권한 부여
C. Accounting – 과금
About paper & terms
5. NAC(Network Access Control)
- 단말이 네트워크에 접근하기 전 보안정책 준수여부를 검사하여 네트워크 사용을 제
어하는 것
- 광범위함
- OpensourceNAC
About paper & terms
Packetfence Opennac Coovachilli Chillispot Wifidog
기능
Webserver, DHCPserver, RADI
USserver, IDS, Firewall
DHCPreader, RADIUSserver,
Antivirus, Firewall, Bulk Confi
guration/backup
RADIUSserver, Webs
erver, CaptivePortal
RADIUSserver, We
bserver
CaptivePortal(Gate
way & Authentica
tion server)
H/W
OpenWRT with hostapd 지원,
HP, Cisco 등 기타 switch & A
P
Cisco, Alcatel, 3Com, etc
CoovaAP(OpenWRT-
based)
Nothing special
OpenWRT, FreeW
RT, DD-WRT
O/S
Ubuntu12.04LTS, Debian7.0, C
entOS 6.x, RedHatEnterpriseLi
nux6.xServer
Windows, Linux, Mac, mobile
device
Ubuntu, Openmoko,
OpenWRT
Redhat, Fedora, De
bian, Mandrake, O
penWRT
Linux
6. Stateless <-> Stateful
A. Design Concept
A. Server side에 Client와 server의 연속된 동작 상태정보를 저장 X <-> 저장O
B. Functional Concept
A. 같은 argument에 대해 항상 같은 값을 반환 <-> 다른 값을 반환(이전 값을 가
지고 있기 때문에 이전 값에 의해 반환되는 값이 변동 될 수 있다.)
About paper & terms
NEXT
FlowNAC :
Flow-based Network Access Control
FlowNAC - IEEE 802.1X
• 위의 과정에서 인증 메시지 교환 시 EAP(Extensible Authentication Protocol)라는 프로토콜 사용
• EAPoL(EAP over LAN) -> LAN, WAN을 통해 EAP 인증 메시지 패킷을 캡슐화하여 전달하는 프로토
콜 – IEEE 802.1X에서 정의
FlowNAC - IEEE 802.1X
EAPoL frame
1. PAE(Policy Access Entity)
- Policy가 적용되는 곳
1. Binary decision
A. When the users are granted to access the
network(identified by source MAC)
B. Access or Deny
C. Coarse-grained granularity
2. Layer 2 protocol
3. DHCP, DNS are not needed
Flow-based Network Access Control solution,
allows to grant users the rights to access the network
depending on the target service requested.
FlowNAC
1. Focusing
A. Managing the identity of end users
B. Applying a policy, based on identity
2. Fine-grained granularity
A. Based on flows (associated to services) to control the access to the network
B. Able to authorize independently access to specific services
C. Multiple services independently controlled for the same user(i.e. identity)
3. Rely on a modified version of IEEE 802.1X
A. Supporting EAPoL-in-EAPoL encapsulation
B. Does not need IP address -> DHCP, DNS are not needed
4. Proactive mode
A. Flow entries are deployed in advance to the actual traffic
B. NAI(Network Access Identifier) – RFC2486 -> must be included the service
C. AA process is supported at the same time
FlowNAC - Property
5. Not Focusing
A. Monitoring
B. Dynamic policies
FlowNAC - Property
Supplicant
(user)
Authenticator
(PEP)
Authentication
server
(PDP)
• PEP(Policy Enforcement Point) – point where policy decisions are actually enforced
• PDP(Policy Decision Point) – point where policy decisions are maded
• PRP(Policy Retrieval Point) – access authorization policies are stored(policy repository)
Policy
Repository
(PRP)
1. Deferent protocol
A. Between supplicant and authenticator
B. Between multiple authentication and authorization processes from the same user
FlowNAC - Architecture
• Identifier – identifies up to 64K different process
• Outer EAPoL
• Inner EAPoL
2. Identifier
A. Must contain at least three different namespace
B. Username, service and domain
C. RFC 2486 – NAI(Network Access Identifier) has two namespaces
a. username or username@realm
D. username@service.domain
3. Policy definition
A. Include the request service as a parameter to be evaluated (not only user but
service)
B. User must be associated to one or several roles
C. XACML(eXtensible Access Control Markup Language)
4. Service MUST be univocally defined
A. Supporting EAPoL-in-EAPoL encapsulation
B. One request -> one action
FlowNAC - Architecture
5. Transmission of the set of authorized flows
A. Between authentication server and the authenticator
B. Currently not support
C. New JSON REST interface
6. Authenticator must enforce the access control
A. Based on the set of flows
FlowNAC - Architecture
FlowNAC – Authenticator(PEP)
• PAE(Port Access Entity)
• PAC(Port Access Controller)
• LMI(Layer Management Interface) – communicate PAE with PAC and control port status
FlowNAC – Authenticator(PEP)
1. SDN DataPath
A. Defined by the Open Networking Foundation
B. Matching fields and action. (Stateless, do not
depend on previous matched frames)
2. ANF(Authenticator Network Function)
A. Implements the functions performed by the
PAE.
B. It receives and parse the EAPoL frames and
encapsulates them in the appropriate
protocol(communicate with the authentication
server)
C. AA control traffic is not encapsulated by
OpenFlow -> avoiding the overhead and
consolidation of the AA processing in the
controller
3. SDN Controller
A. Adding and removing the flow entries
at the SDN datapath
NEXT
Toward an SDN-Enabled NFV Architecture
NAC & SDN
• Stateful network function & Stateless data path processing component
• To keep data processing in hardware as much as possible
• Only forward the data traffic to the stateful component when processing is also stateful
• Avoiding data traffic going up/down to/from a VM
• Independent scalability of each component
NAC & SDN
• A-type -> Authentication and authorization(AA) traffic
• B-type -> Data traffic for the authorized services
• C-type -> Data traffic for non-authorized services
NEXT
An Extended SDN Architecture for
Network Function Virtualization
with a Case Study
on Intrusion Prevention
Intrusion Prevention
• CLA Module – located on the switch
• DPI Module – too expansive to be performed on the switch
• SR Module – decision maker for the policies maintained on the data plane
Intrusion Prevention
• Modify the OpenFlow message
Intrusion Prevention
Q&A
Thank you so much

More Related Content

What's hot

OpenStack and OpenContrail for FreeBSD platform by Michał Dubiel
OpenStack and OpenContrail for FreeBSD platform by Michał DubielOpenStack and OpenContrail for FreeBSD platform by Michał Dubiel
OpenStack and OpenContrail for FreeBSD platform by Michał Dubiel
eurobsdcon
 
SOC Cloud Conductor + SLA
SOC  Cloud Conductor + SLASOC  Cloud Conductor + SLA
SOC Cloud Conductor + SLA
ARCCN
 
Orchestrating NFV Workloads in Multiple Clouds
Orchestrating NFV Workloads in Multiple CloudsOrchestrating NFV Workloads in Multiple Clouds
Orchestrating NFV Workloads in Multiple Clouds
Michelle Holley
 
pps Matters
pps Matterspps Matters
IPv6 at Mythic Beasts - Networkshop44
IPv6 at Mythic Beasts - Networkshop44IPv6 at Mythic Beasts - Networkshop44
IPv6 at Mythic Beasts - Networkshop44
Jisc
 
Software Defined Networking/Openflow: A path to Programmable Networks
Software Defined Networking/Openflow: A path to Programmable NetworksSoftware Defined Networking/Openflow: A path to Programmable Networks
Software Defined Networking/Openflow: A path to Programmable Networks
MyNOG
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Rambus
 
Low Sost Secure VPN SSTP - MUM ID 2012
Low Sost Secure VPN SSTP - MUM ID 2012Low Sost Secure VPN SSTP - MUM ID 2012
Low Sost Secure VPN SSTP - MUM ID 2012Faisal Reza
 
Software defined network and Virtualization
Software defined network and VirtualizationSoftware defined network and Virtualization
Software defined network and Virtualization
idrajeev
 
Neutron-to-Neutron: interconnecting multiple OpenStack deployments
Neutron-to-Neutron: interconnecting multiple OpenStack deploymentsNeutron-to-Neutron: interconnecting multiple OpenStack deployments
Neutron-to-Neutron: interconnecting multiple OpenStack deployments
Thomas Morin
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guide
jww330015
 
Slides for Ph.D. Thesis Defense of Dheryta Jaisinghani at IIIT-Delhi, INDIA
Slides for Ph.D. Thesis Defense of Dheryta Jaisinghani at IIIT-Delhi, INDIASlides for Ph.D. Thesis Defense of Dheryta Jaisinghani at IIIT-Delhi, INDIA
Slides for Ph.D. Thesis Defense of Dheryta Jaisinghani at IIIT-Delhi, INDIA
Dheryta Jaisinghani
 
Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44
Jisc
 
Accelerating SDN Applications with Open Source Network Overlays
Accelerating SDN Applications with Open Source Network OverlaysAccelerating SDN Applications with Open Source Network Overlays
Accelerating SDN Applications with Open Source Network Overlays
Cumulus Networks
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Servermmoizuddin
 
Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44
Jisc
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
Makarand Badgujar
 
CoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenariosCoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenarios
carlosralli
 
Contrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at ScaleContrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at Scale
MarketingArrowECS_CZ
 

What's hot (20)

OpenStack and OpenContrail for FreeBSD platform by Michał Dubiel
OpenStack and OpenContrail for FreeBSD platform by Michał DubielOpenStack and OpenContrail for FreeBSD platform by Michał Dubiel
OpenStack and OpenContrail for FreeBSD platform by Michał Dubiel
 
SOC Cloud Conductor + SLA
SOC  Cloud Conductor + SLASOC  Cloud Conductor + SLA
SOC Cloud Conductor + SLA
 
Orchestrating NFV Workloads in Multiple Clouds
Orchestrating NFV Workloads in Multiple CloudsOrchestrating NFV Workloads in Multiple Clouds
Orchestrating NFV Workloads in Multiple Clouds
 
pps Matters
pps Matterspps Matters
pps Matters
 
IPv6 at Mythic Beasts - Networkshop44
IPv6 at Mythic Beasts - Networkshop44IPv6 at Mythic Beasts - Networkshop44
IPv6 at Mythic Beasts - Networkshop44
 
VPNaaS in Neutron
VPNaaS in NeutronVPNaaS in Neutron
VPNaaS in Neutron
 
Software Defined Networking/Openflow: A path to Programmable Networks
Software Defined Networking/Openflow: A path to Programmable NetworksSoftware Defined Networking/Openflow: A path to Programmable Networks
Software Defined Networking/Openflow: A path to Programmable Networks
 
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
Protecting Data In Motion with MACsec - Gijs Willemse - Rambus Design Summit ...
 
Low Sost Secure VPN SSTP - MUM ID 2012
Low Sost Secure VPN SSTP - MUM ID 2012Low Sost Secure VPN SSTP - MUM ID 2012
Low Sost Secure VPN SSTP - MUM ID 2012
 
Software defined network and Virtualization
Software defined network and VirtualizationSoftware defined network and Virtualization
Software defined network and Virtualization
 
Neutron-to-Neutron: interconnecting multiple OpenStack deployments
Neutron-to-Neutron: interconnecting multiple OpenStack deploymentsNeutron-to-Neutron: interconnecting multiple OpenStack deployments
Neutron-to-Neutron: interconnecting multiple OpenStack deployments
 
IWAN Lab Guide
IWAN Lab GuideIWAN Lab Guide
IWAN Lab Guide
 
Slides for Ph.D. Thesis Defense of Dheryta Jaisinghani at IIIT-Delhi, INDIA
Slides for Ph.D. Thesis Defense of Dheryta Jaisinghani at IIIT-Delhi, INDIASlides for Ph.D. Thesis Defense of Dheryta Jaisinghani at IIIT-Delhi, INDIA
Slides for Ph.D. Thesis Defense of Dheryta Jaisinghani at IIIT-Delhi, INDIA
 
Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44Eduroam workshop nic mitev loughborough uni - networkshop44
Eduroam workshop nic mitev loughborough uni - networkshop44
 
Accelerating SDN Applications with Open Source Network Overlays
Accelerating SDN Applications with Open Source Network OverlaysAccelerating SDN Applications with Open Source Network Overlays
Accelerating SDN Applications with Open Source Network Overlays
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44Ipv6 deployment at the university of warwick - networkshop44
Ipv6 deployment at the university of warwick - networkshop44
 
Iot protocols seminar
Iot protocols seminarIot protocols seminar
Iot protocols seminar
 
CoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenariosCoAP Course for m2m and Internet of Things scenarios
CoAP Course for m2m and Internet of Things scenarios
 
Contrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at ScaleContrail Deep-dive - Cloud Network Services at Scale
Contrail Deep-dive - Cloud Network Services at Scale
 

Viewers also liked

2012 빅데이터 big data 발표자료
2012 빅데이터 big data 발표자료2012 빅데이터 big data 발표자료
2012 빅데이터 big data 발표자료
Wooseung Kim
 
Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NAC
digitallibrary
 
ForeScout: Our Approach
ForeScout: Our ApproachForeScout: Our Approach
ForeScout: Our Approach
Forescout Technologies Inc
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
Forescout Technologies Inc
 
NAC - Network Acess Control
NAC - Network Acess ControlNAC - Network Acess Control
NAC - Network Acess Control
Gionni Lúcio
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
Forescout Technologies Inc
 
Battlemesh(part.3)
Battlemesh(part.3)Battlemesh(part.3)
Battlemesh(part.3)
Kyunghee Univ
 
Small ventricular septal defects
Small ventricular septal defectsSmall ventricular septal defects
Small ventricular septal defects
Ramachandra Barik
 
일하는여성79호 내지98p
일하는여성79호 내지98p일하는여성79호 내지98p
일하는여성79호 내지98p
kwwa
 
DHCP & AAA in ONOS application
DHCP & AAA in ONOS applicationDHCP & AAA in ONOS application
DHCP & AAA in ONOS application
Kyunghee Univ
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
Forescout Technologies Inc
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
Andris Soroka
 
nism equity
nism equitynism equity
nism equity
lokesh patel
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
Forescout Technologies Inc
 
Mbc 시민교양강좌
Mbc 시민교양강좌Mbc 시민교양강좌
Mbc 시민교양강좌Yong-wook Shin
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillTheAnfieldGroup
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsIncheon Park
 
Massage Businesses Regulation in Los Angeles
Massage Businesses Regulation in Los Angeles Massage Businesses Regulation in Los Angeles
Massage Businesses Regulation in Los Angeles
thai_entrepreneur_usa
 
Report to the NAC
Report to the NACReport to the NAC
Report to the NAC
Larry Smarr
 

Viewers also liked (20)

2012 빅데이터 big data 발표자료
2012 빅데이터 big data 발표자료2012 빅데이터 big data 발표자료
2012 빅데이터 big data 발표자료
 
Why NAC and Why Not NAC
Why NAC and Why Not NACWhy NAC and Why Not NAC
Why NAC and Why Not NAC
 
ForeScout: Our Approach
ForeScout: Our ApproachForeScout: Our Approach
ForeScout: Our Approach
 
Frost & Sullivan Report
Frost & Sullivan ReportFrost & Sullivan Report
Frost & Sullivan Report
 
NAC - Network Acess Control
NAC - Network Acess ControlNAC - Network Acess Control
NAC - Network Acess Control
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Battlemesh(part.3)
Battlemesh(part.3)Battlemesh(part.3)
Battlemesh(part.3)
 
Small ventricular septal defects
Small ventricular septal defectsSmall ventricular septal defects
Small ventricular septal defects
 
일하는여성79호 내지98p
일하는여성79호 내지98p일하는여성79호 내지98p
일하는여성79호 내지98p
 
DHCP & AAA in ONOS application
DHCP & AAA in ONOS applicationDHCP & AAA in ONOS application
DHCP & AAA in ONOS application
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
nism equity
nism equitynism equity
nism equity
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
Mbc 시민교양강좌
Mbc 시민교양강좌Mbc 시민교양강좌
Mbc 시민교양강좌
 
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir GillEliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
Eliminate Silos to Enhance Critical Infrastructure Protection by Jasvir Gill
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Massage Businesses Regulation in Los Angeles
Massage Businesses Regulation in Los Angeles Massage Businesses Regulation in Los Angeles
Massage Businesses Regulation in Los Angeles
 
Report to the NAC
Report to the NACReport to the NAC
Report to the NAC
 

Similar to Paper review about NAC & SDN

CCNA-Syllabus-compressed.pdf
CCNA-Syllabus-compressed.pdfCCNA-Syllabus-compressed.pdf
CCNA-Syllabus-compressed.pdf
IT Education Centre
 
SDN and NFV Value in Business Services
SDN and NFV Value in Business ServicesSDN and NFV Value in Business Services
SDN and NFV Value in Business Services
Alan Sardella
 
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkThe Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
Open Networking Summits
 
Dynamic Classification in a Silicon-Based Forwarding Engine
Dynamic Classification in a Silicon-Based Forwarding EngineDynamic Classification in a Silicon-Based Forwarding Engine
Dynamic Classification in a Silicon-Based Forwarding Engine
Tal Lavian Ph.D.
 
Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh Integration
ThomasGraf42
 
SDN and NFV Value in Business Services - A Presentation By Cox Communications
SDN and NFV Value in Business Services - A Presentation By Cox CommunicationsSDN and NFV Value in Business Services - A Presentation By Cox Communications
SDN and NFV Value in Business Services - A Presentation By Cox Communications
Cisco Service Provider
 
Introduction to NBL
Introduction to NBLIntroduction to NBL
Introduction to NBL
Fei Ji Siao
 
ONOS-Based VIM Implementation
ONOS-Based VIM ImplementationONOS-Based VIM Implementation
ONOS-Based VIM Implementation
OPNFV
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIs
Cisco DevNet
 
ietf117-netconf-yang-push-data-mesh-integration.pdf
ietf117-netconf-yang-push-data-mesh-integration.pdfietf117-netconf-yang-push-data-mesh-integration.pdf
ietf117-netconf-yang-push-data-mesh-integration.pdf
ThomasGraf42
 
the-ieee-8021-standards.pptx
the-ieee-8021-standards.pptxthe-ieee-8021-standards.pptx
the-ieee-8021-standards.pptx
CMWason
 
lect4_SDNbasic_openflow.pptx
lect4_SDNbasic_openflow.pptxlect4_SDNbasic_openflow.pptx
lect4_SDNbasic_openflow.pptx
JesicaDcruz1
 
Plnog15 paweł wachelka - sieć oraz bezpieczeństwo w chmurze
Plnog15   paweł wachelka - sieć oraz bezpieczeństwo w chmurzePlnog15   paweł wachelka - sieć oraz bezpieczeństwo w chmurze
Plnog15 paweł wachelka - sieć oraz bezpieczeństwo w chmurze
Marta Pacyga
 
PLNOG15: Network and cloud security,Pawel Wachelka
PLNOG15: Network and cloud security,Pawel WachelkaPLNOG15: Network and cloud security,Pawel Wachelka
PLNOG15: Network and cloud security,Pawel Wachelka
PROIDEA
 
Software Innovations and Control Plane Evolution in the new SDN Transport Arc...
Software Innovations and Control Plane Evolution in the new SDN Transport Arc...Software Innovations and Control Plane Evolution in the new SDN Transport Arc...
Software Innovations and Control Plane Evolution in the new SDN Transport Arc...
Cisco Canada
 
#lspe: Dynamic Scaling
#lspe: Dynamic Scaling #lspe: Dynamic Scaling
#lspe: Dynamic Scaling
steveshah
 
Spirent SDN and NFV Solutions
Spirent SDN and NFV SolutionsSpirent SDN and NFV Solutions
Spirent SDN and NFV Solutions
Malathi Malla
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV Deployments
Sailaja Tennati
 
IPv6/IPv4 Transition: The experience sharing of Tunnel Broker deployment
IPv6/IPv4 Transition: The experience sharing of Tunnel Broker deployment IPv6/IPv4 Transition: The experience sharing of Tunnel Broker deployment
IPv6/IPv4 Transition: The experience sharing of Tunnel Broker deployment
Ethern Lin
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
Daniel Viveros Sepulveda
 

Similar to Paper review about NAC & SDN (20)

CCNA-Syllabus-compressed.pdf
CCNA-Syllabus-compressed.pdfCCNA-Syllabus-compressed.pdf
CCNA-Syllabus-compressed.pdf
 
SDN and NFV Value in Business Services
SDN and NFV Value in Business ServicesSDN and NFV Value in Business Services
SDN and NFV Value in Business Services
 
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale NetworkThe Challenges of SDN/OpenFlow in an Operational and Large-scale Network
The Challenges of SDN/OpenFlow in an Operational and Large-scale Network
 
Dynamic Classification in a Silicon-Based Forwarding Engine
Dynamic Classification in a Silicon-Based Forwarding EngineDynamic Classification in a Silicon-Based Forwarding Engine
Dynamic Classification in a Silicon-Based Forwarding Engine
 
Addressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh IntegrationAddressing Network Operator Challenges in YANG push Data Mesh Integration
Addressing Network Operator Challenges in YANG push Data Mesh Integration
 
SDN and NFV Value in Business Services - A Presentation By Cox Communications
SDN and NFV Value in Business Services - A Presentation By Cox CommunicationsSDN and NFV Value in Business Services - A Presentation By Cox Communications
SDN and NFV Value in Business Services - A Presentation By Cox Communications
 
Introduction to NBL
Introduction to NBLIntroduction to NBL
Introduction to NBL
 
ONOS-Based VIM Implementation
ONOS-Based VIM ImplementationONOS-Based VIM Implementation
ONOS-Based VIM Implementation
 
DEVNET-1166 Open SDN Controller APIs
DEVNET-1166	Open SDN Controller APIsDEVNET-1166	Open SDN Controller APIs
DEVNET-1166 Open SDN Controller APIs
 
ietf117-netconf-yang-push-data-mesh-integration.pdf
ietf117-netconf-yang-push-data-mesh-integration.pdfietf117-netconf-yang-push-data-mesh-integration.pdf
ietf117-netconf-yang-push-data-mesh-integration.pdf
 
the-ieee-8021-standards.pptx
the-ieee-8021-standards.pptxthe-ieee-8021-standards.pptx
the-ieee-8021-standards.pptx
 
lect4_SDNbasic_openflow.pptx
lect4_SDNbasic_openflow.pptxlect4_SDNbasic_openflow.pptx
lect4_SDNbasic_openflow.pptx
 
Plnog15 paweł wachelka - sieć oraz bezpieczeństwo w chmurze
Plnog15   paweł wachelka - sieć oraz bezpieczeństwo w chmurzePlnog15   paweł wachelka - sieć oraz bezpieczeństwo w chmurze
Plnog15 paweł wachelka - sieć oraz bezpieczeństwo w chmurze
 
PLNOG15: Network and cloud security,Pawel Wachelka
PLNOG15: Network and cloud security,Pawel WachelkaPLNOG15: Network and cloud security,Pawel Wachelka
PLNOG15: Network and cloud security,Pawel Wachelka
 
Software Innovations and Control Plane Evolution in the new SDN Transport Arc...
Software Innovations and Control Plane Evolution in the new SDN Transport Arc...Software Innovations and Control Plane Evolution in the new SDN Transport Arc...
Software Innovations and Control Plane Evolution in the new SDN Transport Arc...
 
#lspe: Dynamic Scaling
#lspe: Dynamic Scaling #lspe: Dynamic Scaling
#lspe: Dynamic Scaling
 
Spirent SDN and NFV Solutions
Spirent SDN and NFV SolutionsSpirent SDN and NFV Solutions
Spirent SDN and NFV Solutions
 
Spirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV DeploymentsSpirent Accelerating SDN and NFV Deployments
Spirent Accelerating SDN and NFV Deployments
 
IPv6/IPv4 Transition: The experience sharing of Tunnel Broker deployment
IPv6/IPv4 Transition: The experience sharing of Tunnel Broker deployment IPv6/IPv4 Transition: The experience sharing of Tunnel Broker deployment
IPv6/IPv4 Transition: The experience sharing of Tunnel Broker deployment
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
 

More from Kyunghee Univ

[20170328]sdn nfv intro
[20170328]sdn nfv intro[20170328]sdn nfv intro
[20170328]sdn nfv intro
Kyunghee Univ
 
Battlemesh(part.2)
Battlemesh(part.2)Battlemesh(part.2)
Battlemesh(part.2)
Kyunghee Univ
 
Battlemesh(part.1)
Battlemesh(part.1)Battlemesh(part.1)
Battlemesh(part.1)
Kyunghee Univ
 
[20160621]Constructing Infrastructure Wireless Network Using Open Source
[20160621]Constructing Infrastructure Wireless Network Using Open Source[20160621]Constructing Infrastructure Wireless Network Using Open Source
[20160621]Constructing Infrastructure Wireless Network Using Open Source
Kyunghee Univ
 
[20160620]CCTV 구현 자료
[20160620]CCTV 구현 자료[20160620]CCTV 구현 자료
[20160620]CCTV 구현 자료
Kyunghee Univ
 
OpenCAPWAP paper review
OpenCAPWAP paper reviewOpenCAPWAP paper review
OpenCAPWAP paper review
Kyunghee Univ
 
Batman project
Batman projectBatman project
Batman project
Kyunghee Univ
 
GOTHAM 오픈소스 메쉬 네트워킹 소프트웨어 패키지
GOTHAM 오픈소스 메쉬 네트워킹 소프트웨어 패키지GOTHAM 오픈소스 메쉬 네트워킹 소프트웨어 패키지
GOTHAM 오픈소스 메쉬 네트워킹 소프트웨어 패키지
Kyunghee Univ
 

More from Kyunghee Univ (8)

[20170328]sdn nfv intro
[20170328]sdn nfv intro[20170328]sdn nfv intro
[20170328]sdn nfv intro
 
Battlemesh(part.2)
Battlemesh(part.2)Battlemesh(part.2)
Battlemesh(part.2)
 
Battlemesh(part.1)
Battlemesh(part.1)Battlemesh(part.1)
Battlemesh(part.1)
 
[20160621]Constructing Infrastructure Wireless Network Using Open Source
[20160621]Constructing Infrastructure Wireless Network Using Open Source[20160621]Constructing Infrastructure Wireless Network Using Open Source
[20160621]Constructing Infrastructure Wireless Network Using Open Source
 
[20160620]CCTV 구현 자료
[20160620]CCTV 구현 자료[20160620]CCTV 구현 자료
[20160620]CCTV 구현 자료
 
OpenCAPWAP paper review
OpenCAPWAP paper reviewOpenCAPWAP paper review
OpenCAPWAP paper review
 
Batman project
Batman projectBatman project
Batman project
 
GOTHAM 오픈소스 메쉬 네트워킹 소프트웨어 패키지
GOTHAM 오픈소스 메쉬 네트워킹 소프트웨어 패키지GOTHAM 오픈소스 메쉬 네트워킹 소프트웨어 패키지
GOTHAM 오픈소스 메쉬 네트워킹 소프트웨어 패키지
 

Recently uploaded

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
Matt Welsh
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
abdulrafaychaudhry
 

Recently uploaded (20)

Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Large Language Models and the End of Programming
Large Language Models and the End of ProgrammingLarge Language Models and the End of Programming
Large Language Models and the End of Programming
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
Pro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp BookPro Unity Game Development with C-sharp Book
Pro Unity Game Development with C-sharp Book
 

Paper review about NAC & SDN

  • 1. NAC & SDN : about flowNAC with traffic flow 김준호 2015.09.23 Mobile Convergence LAB, Department of Computer Engineering, Kyung Hee University.
  • 2. 1. About paper & terms 2. FlowNAC 3. NAC & SDN 4. Intrusion Prevention 5. Q&A Contents
  • 3. About paper & terms FlowNAC : Flow-based Network Access Control Conference 2014 Third European Workshop on Software-Defined Networks 2014 Spain Toward an SDN-Enabled NFV Architecture Magazine IEEE Communications Magazine : April 2015 2015 Spain An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Prevention Magazine IEEE Network May/June 2015 2015 Taiwan
  • 4. 1. IEEE 802.1X - port-based network access control(PNAC)에 관한 IEEE의 표준 - 유선 or 무선랜에 연결하고자 하는 장치에 대한 인증 메커니즘을 설명(Layer 2) 2. Granularity (입도 – 암석을 이루고 있는 광물 입자 크기) A. Fine-grained – 결이 고운(세부적인 기능으로 나뉘어 있는) B. Coarse-grained – 결이 거친(큰 기능으로 나뉘어 있는) 3. Proactive <-> Reactive A. 앞서 주도하는 <-> 반응을 보이는 4. AAA A. Authentication - 인증 B. Authorization – 권한 부여 C. Accounting – 과금 About paper & terms
  • 5. 5. NAC(Network Access Control) - 단말이 네트워크에 접근하기 전 보안정책 준수여부를 검사하여 네트워크 사용을 제 어하는 것 - 광범위함 - OpensourceNAC About paper & terms Packetfence Opennac Coovachilli Chillispot Wifidog 기능 Webserver, DHCPserver, RADI USserver, IDS, Firewall DHCPreader, RADIUSserver, Antivirus, Firewall, Bulk Confi guration/backup RADIUSserver, Webs erver, CaptivePortal RADIUSserver, We bserver CaptivePortal(Gate way & Authentica tion server) H/W OpenWRT with hostapd 지원, HP, Cisco 등 기타 switch & A P Cisco, Alcatel, 3Com, etc CoovaAP(OpenWRT- based) Nothing special OpenWRT, FreeW RT, DD-WRT O/S Ubuntu12.04LTS, Debian7.0, C entOS 6.x, RedHatEnterpriseLi nux6.xServer Windows, Linux, Mac, mobile device Ubuntu, Openmoko, OpenWRT Redhat, Fedora, De bian, Mandrake, O penWRT Linux
  • 6. 6. Stateless <-> Stateful A. Design Concept A. Server side에 Client와 server의 연속된 동작 상태정보를 저장 X <-> 저장O B. Functional Concept A. 같은 argument에 대해 항상 같은 값을 반환 <-> 다른 값을 반환(이전 값을 가 지고 있기 때문에 이전 값에 의해 반환되는 값이 변동 될 수 있다.) About paper & terms
  • 8. FlowNAC - IEEE 802.1X • 위의 과정에서 인증 메시지 교환 시 EAP(Extensible Authentication Protocol)라는 프로토콜 사용 • EAPoL(EAP over LAN) -> LAN, WAN을 통해 EAP 인증 메시지 패킷을 캡슐화하여 전달하는 프로토 콜 – IEEE 802.1X에서 정의
  • 9. FlowNAC - IEEE 802.1X EAPoL frame 1. PAE(Policy Access Entity) - Policy가 적용되는 곳 1. Binary decision A. When the users are granted to access the network(identified by source MAC) B. Access or Deny C. Coarse-grained granularity 2. Layer 2 protocol 3. DHCP, DNS are not needed
  • 10. Flow-based Network Access Control solution, allows to grant users the rights to access the network depending on the target service requested. FlowNAC
  • 11. 1. Focusing A. Managing the identity of end users B. Applying a policy, based on identity 2. Fine-grained granularity A. Based on flows (associated to services) to control the access to the network B. Able to authorize independently access to specific services C. Multiple services independently controlled for the same user(i.e. identity) 3. Rely on a modified version of IEEE 802.1X A. Supporting EAPoL-in-EAPoL encapsulation B. Does not need IP address -> DHCP, DNS are not needed 4. Proactive mode A. Flow entries are deployed in advance to the actual traffic B. NAI(Network Access Identifier) – RFC2486 -> must be included the service C. AA process is supported at the same time FlowNAC - Property
  • 12. 5. Not Focusing A. Monitoring B. Dynamic policies FlowNAC - Property Supplicant (user) Authenticator (PEP) Authentication server (PDP) • PEP(Policy Enforcement Point) – point where policy decisions are actually enforced • PDP(Policy Decision Point) – point where policy decisions are maded • PRP(Policy Retrieval Point) – access authorization policies are stored(policy repository) Policy Repository (PRP)
  • 13. 1. Deferent protocol A. Between supplicant and authenticator B. Between multiple authentication and authorization processes from the same user FlowNAC - Architecture • Identifier – identifies up to 64K different process • Outer EAPoL • Inner EAPoL
  • 14. 2. Identifier A. Must contain at least three different namespace B. Username, service and domain C. RFC 2486 – NAI(Network Access Identifier) has two namespaces a. username or username@realm D. username@service.domain 3. Policy definition A. Include the request service as a parameter to be evaluated (not only user but service) B. User must be associated to one or several roles C. XACML(eXtensible Access Control Markup Language) 4. Service MUST be univocally defined A. Supporting EAPoL-in-EAPoL encapsulation B. One request -> one action FlowNAC - Architecture
  • 15. 5. Transmission of the set of authorized flows A. Between authentication server and the authenticator B. Currently not support C. New JSON REST interface 6. Authenticator must enforce the access control A. Based on the set of flows FlowNAC - Architecture
  • 16. FlowNAC – Authenticator(PEP) • PAE(Port Access Entity) • PAC(Port Access Controller) • LMI(Layer Management Interface) – communicate PAE with PAC and control port status
  • 17. FlowNAC – Authenticator(PEP) 1. SDN DataPath A. Defined by the Open Networking Foundation B. Matching fields and action. (Stateless, do not depend on previous matched frames) 2. ANF(Authenticator Network Function) A. Implements the functions performed by the PAE. B. It receives and parse the EAPoL frames and encapsulates them in the appropriate protocol(communicate with the authentication server) C. AA control traffic is not encapsulated by OpenFlow -> avoiding the overhead and consolidation of the AA processing in the controller 3. SDN Controller A. Adding and removing the flow entries at the SDN datapath
  • 18. NEXT Toward an SDN-Enabled NFV Architecture
  • 19. NAC & SDN • Stateful network function & Stateless data path processing component • To keep data processing in hardware as much as possible • Only forward the data traffic to the stateful component when processing is also stateful • Avoiding data traffic going up/down to/from a VM • Independent scalability of each component
  • 20. NAC & SDN • A-type -> Authentication and authorization(AA) traffic • B-type -> Data traffic for the authorized services • C-type -> Data traffic for non-authorized services
  • 21. NEXT An Extended SDN Architecture for Network Function Virtualization with a Case Study on Intrusion Prevention
  • 22. Intrusion Prevention • CLA Module – located on the switch • DPI Module – too expansive to be performed on the switch • SR Module – decision maker for the policies maintained on the data plane
  • 23. Intrusion Prevention • Modify the OpenFlow message

Editor's Notes

  1. WTP start