CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 1 #airheadsconf#airheadsconf
Advanced Security:
Protecting Your Network End-to-End with
Aruba Networks Personalized Security
Rich Langston
Jon Green
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 2 #airheadsconf
•  Traditional Network Security Model Is No
Longer Effective
•  Personalized, Context Aware Security is the
Answer
•  Components of Personalized Security
•  Implementing Personalized Security Network-
wide with Aruba Networks
Agenda
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 3 #airheadsconf
Challenge of Security in the Enterprise
Security works toward:
•  Reduce the likelihood of an information security breach
•  Reduce the impact of any breach or malware outbreak
•  Create an audit trail to ensure policy compliance
•  Increase the reliability of your network
But, we also need to:
•  Ensure enterprise-critical apps are always available
•  Keep everyone productive
•  Allow guests on our network
•  Support remote workers just like they are in the office
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 4 #airheadsconf
Traditional Model Barely Worked
Enterprise Perimeter
Employees
WAN
Branch Office
Branch
Employees
Home Offices
Internet
Data Center
Visitors
Contractors
Enterprise Perimeter
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 5 #airheadsconf
Over Time, More Holes Appeared
Enterprise Perimeter
Employees
WAN
Branch Office
Branch
Employees
Home Offices
Internet
Data Center
Visitors
Contractors
Enterprise Perimeter
Road
Warriors
Partner Sites
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 6 #airheadsconf
BYOD and Mobility Break It
Enterprise Perimeter
Employees
BYOD
WAN
Branch Office
Branch
Employees
Home Offices
Internet
Data Center
Visitors
Contractors
Enterprise Perimeter
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 7 #airheadsconf
Personalized, Context Aware
Security is The Answer
Data Center
Peter
JuliaPartners
Branch
Employees
Ash
Rich
Scott
Dave
Sujatha
Contractors
Visitors
Grace
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 8 #airheadsconf
Personalized Security Solves Our
Problems
  Reduce the likelihood of an information security breach
  Reduce the impact of any breach or malware outbreak
  Create an audit trail to ensure policy compliance
  Increase the reliability of your network
  Ensure enterprise-critical apps are always available
  Keep everyone productive
  Allow guests on our network
  Support remote workers just like they are in the office
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 9 #airheadsconf#airheadsconf9
Prerequisites for Personalized
Security
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 10 #airheadsconf
Prerequisites for Personalized Security
1101010001001111100
Identify
the Device
and User
Classify
the Traffic
Control Optimize
the Experience
Follow
the UserAccess
Secure
the
Connection
Across All Access Methods
Instant
AP
Mobility Access
Switch
Mobility
Controller
VPN
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 11 #airheadsconf
Prerequisites for Personalized Security
1101010001001111100
Identify
the Device
and User
Classify
the Traffic
Control Optimize
the Experience
Follow
the UserAccess
Secure
the
Connection
At All Locations
HQ Branch SOHO Road Warrior
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 12 #airheadsconf
With a Single, Universal policy
Any DeviceAny User
Employee Contractor
Visitor
PatientShopper
Any App
  Posture
  BYOD
  Corporate
  Time of Day
  External Data
Any Data
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 13 #airheadsconf
Typical Aruba Network
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 14 #airheadsconf
Security Architecture Roles
ClearPass Policy Manager
Mobility Access Switch
Controller
• Policy  Decision  Point  for  wired  and  wireless  
• Authen5ca5on  Server  
• Cer5ficate  Authority  for  BYOD  
• PDP  in  non-­‐CP  environments  
• Policy  Enforcement  Point    
• Policy  Enforcement  Points  
Branch Office Instant RAP
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 15 #airheadsconf
AirWave – Complete Network Insight
•  Controller sends all events to Airwave
•  User authentications
•  Wireless Intrusion events
•  All application data
•  Account for network activity by user, time, date,
location
•  Who used what applications? When?
•  Which applications are taking all my bandwidth?
•  Requires AirWave 7.7 or later
•  Ensure PCI compliance with built-in reports
•  Forensic information for network outage reports
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 16 #airheadsconf#airheadsconf16
Personalized Security Step-By-Step
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 17 #airheadsconf#airheadsconf17
Universal Encryption
Secure
the
Connection
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 18 #airheadsconf
WPA2 Enterprise - Strong Over Air
Encryption
•  Combines strong encryption,
including AES-CCMP, with mutual
authentication
•  Ensures users do not connect to an
imposter AP
•  Protects the data to the level that the
Federal Information Processing Standard
requires
•  Not subject to the brute force
attacks used against weak WPA2
PSK passphrases
•  More secure than an open
Ethernet port
WPA2 Handshake
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 19 #airheadsconf
•  Short answer: Yes – because of things like
rainbow tables, distributed cracking, fast GPUs,
etc.
•  This is why we use MSCHAPv2 inside a TLS
tunnel for Wi-Fi
•  Still using PPTP for VPN? Watch out…
Isn’t MSCHAPv2 broken?
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 20 #airheadsconf
Centralized encryption increases security
Employee
Authentication
AuthorizationIdentification
Malicious Insider
Traditional Distributed
Encrytion
DisconnectAruba Centralized Encryption
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 21 #airheadsconf
Mobility
Controller
ClearPass Policy
Manager
Branch Office Instant
Encryption Extends Everywhere
AirWave
Management
Platform
Tu
Local MAS LAN Switch
Internet
LAN Core
Remote Office MAS Switch
RAP
Phone, Laptop, Tablet
•  IPSec encryption
protects all edge
traffic
•  Full IKEv2 Support
•  Regardless of
access method
•  VIA
•  RAP
•  Remote MAS
•  Instant
•  Local MAS
•  Eliminates
eavesdropping on
the wire
IPSec
IPSec
IPSec
IPSec
IPSec or GRE
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 22 #airheadsconf
Aruba VIA Client
  Mobile device policy compliance
•  End-to-end authenticated and encrypted session
to controller
•  Automatically detects trusted/untrusted network;
establishes connected when needed
  Supported devices
•  Windows (32/64 bit)
•  Apple iOS
•  Mac OSX
•  Android 4.x
•  Linux (April 2013)
  Seamless Mobility
•  Firewall policies tied to user role
•  Same policy as in campus, branch
  Best in Class Security
•  Supports NSA-approved Suite B
cryptography
•  IPsec VPN with SSL fallback
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 23 #airheadsconf#airheadsconf23
Authenticate Everything
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 24 #airheadsconf
•  Use Mutual Authentication whenever possible
•  Network proves its identity to the client
•  Client Proves its identity to the network
•  Whenever possible, use single sign on (SSO)
strategies
•  Not only across network types, but also enterprise apps
•  Typically, link LDAP or Active Directory to all enterprise access
•  Multiple options for securing identity
•  AD Credentials, User based certificates, machine
certifications, Multifactor Authentication
•  Options for multiple identity stores
Strong Authentication of User and Device
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 25 #airheadsconf
Universal Authentication for Wired,
Wireless, and Remote Users
Mobility Access SwitchController
•  WPA2-Enterprise for wireless security
– Includes 802.1X for strong authentication
•  Multiple Methods for Wired Authentication
– 802.1X
– MAC
– User Derived Roles
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 26 #airheadsconf
EAP to RADIUS Server
EAPOL (EAP over LAN) RADIUS
EAP Session
ClearPass
PM
AP/Controller
STA
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 27 #airheadsconf
Local EAP Termination
EAPOL (EAP over LAN) RADIUS/LDAP (optional)
EAP Session
Authentication
Server
AP/Controller
STA
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 28 #airheadsconf
•  Strong authentication of user yields their identity
and their role
•  Strong authentication of the device yields its risk
profile
•  Allows fine grain assignment of roles and a
highly personalized experience
Extended Identity is Key to Personal
Security
Employee
Rich
Product
Management
BYOD iPAD Employee
Rich
Product
Management
Corp. MacBook
+ + + +!=
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 29 #airheadsconf
How do we assign these roles?
•  Controller
•  Default Roles can be assigned
•  Roles can be derived using a few basic traits
•  ClearPass
•  Roles can be assigned based on the authenticating user and
device
•  ClearPass profiling
•  ClearPass can fingerprint the device using a variety of traits
•  This can trigger an onboarding event for quicker, safer
authentication next time
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 30 #airheadsconf
Role Derivation
Default
Roles
• Configurable by authentication method
• SSID
User
Rules
• Device-specific attributes
• Encryption type
• AP used (by name or BSSID)
Server
Derived
Roles
• Role assignment based on attributes
from ClearPass server
• Different access privileges based on
security policy
• Can use single SSID for all users/
devices
• ClearPass advanced profiling
• Policy compliance
• Real Time event driven
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 31 #airheadsconf
What Does ClearPass Profile?
ClearPass
Profiling
Smart
Devices
Laptops/
Desktops
Network/
Non Login
Devices
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 32 #airheadsconf
1. Device type
automatically
detected &
redirected to
portal
2. Settings &
credentials are
auto-configured
after user enters
domain credentials
3. User
automatically
placed on proper
SSID & network
segment
ClearPass Device Onboarding
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 33 #airheadsconf
Granular BYOD Onboarding Controls
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 34 #airheadsconf
How Can I Use This Information?
Device
enters
network
Placed directly
into restricted
role
Placed in
onboarding
role, complete
onboarding
process
Typically, assign
very low privilege
role. Perhaps a
remediation role
Typically,
assign to
higher access
role
Corp. device
directly placed
in correct role
Typically, full
access to their
needed
resources
Profile
device
Problem
Compliant, Successful
Compliant
Non-Compliant
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 35 #airheadsconf
How do I safely give Guests Network
access
Controller-based Guest Access
–  Customizable welcome page
–  Flexible authentication options
ClearPass based Guest Access
–  Highly customizable
–  Advertising options
–  Self registration
–  Sponsored registration
–  Preregistration
Aruba Company
Confidental 35
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 36 #airheadsconf
Access Network
1. Sponsor creates
guest credentials
ClearPass Policy
Manager
2. Account enabled,
visitor notified VIA
screen, SMS, or email
3. User logs in
when they arrive
New Guest
Sponsor
Example: Sponsor Registration
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 37 #airheadsconf#airheadsconf37
Control Access
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 38 #airheadsconf
Typical Roles
Guest
Contractor
Doctor
Students
Faculty
Employee
Employee – BYOD
Corporate Mobile Device
Unified Communications
Infrastructure
Aruba Company
Confidental 38
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 39 #airheadsconf
Multiple classes of users on same
infrastructure easily separated
AAA Services
RADIUS, LDAP, AD
Security Services
Anti-Virus, IPS, URL Filtering
Access On-Ramps
Access Point
SSID: Corp
Access Point
SSID: GUEST
S2500/3500
Wired Ports
Mobility Controller
QoSFW
QoSFW
QoSFW
QoSFW
QoSFWGuest
Mobile Device
VoIP Device
Contractor
Employee
Role-Based Security
Role-based Access Control
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 40 #airheadsconf
Why Worry About Authorization?
Where is the “network perimeter” today?
  Mobility brings us:
  Disappearance of physical
security
  New mobile users, devices
appearing everyday
  Increased exposure to
malware
  Assuming that “the bad guys
are outside the firewall, the
good guys are inside” is a
recipe for disaster
We meet
again, Agent
99!
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 41 #airheadsconf
VLAN-Based Security Can’t Scale
MAC, IP –
User
Mapping
User –
VLAN
Mapping
VLAN –
Policy
Mapping
•  User identity is based on MAC or IP address
(weak identities – like a boarding pass)
•  Maintaining VLAN/Role mappings across a
large network is very difficult
•  User identity can be spoofed which means
ACL can be violated
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 42 #airheadsconf
Session Processing
–  Identity-based firewall policies
–  MAC Address – IP Address – VLAN – User Name – User Role – Firewall
Policies binding
–  Traffic Management
Protocol Processing
–  ALG for SIP, RTSP, FTP, TFTP, SCCP, Vocera, ICMP
–  Intrusion/DoS Detection and Prevention
–  Detects SYN, ping, ports scan attacks
–  Can prevent continued attacks (black list station)
–  Enforces TCP handshakes, prevents replay attacks
Station Blacklisting
–  Authentication Failure
–  Firewall Rule Violation
–  TCP Attacks
ICSA Certified
Aruba Policy Enforcement Firewall
Context Aware, Identity Based
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 43 #airheadsconf
AppRF Application Monitoring and
Control
•  New “Firewall” Dashboard UI
•  Includes summary views of activity by Users, Devices, Destinations,
Applications, WLANs, Roles
•  Allows drilling down into details of each
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 44 #airheadsconf
Real-Time Application Control
•  Dynamic web-application
prioritization
•  Use roles to limit or QoS
applications
•  Real Time ACLs updated
whenever user tries to use
app
•  ACLs can block, QoS, log,
mirror traffic, pause
scanning
•  No impact on throughput
Soon:
•  Config stubs for common
web-based applications
Detect
Application
Create ACL
Assign To Roll
User triggers
update
Traffic blocked/
QoS adjusted
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 45 #airheadsconf
Built in CA for BYOD Device Access
Revocation
Revoke Device
Network Access
Device
Inventory Data
Built in CA
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 46 #airheadsconf
What about compromised devices?
In order to maintain the reliability of your network,
it’s important to maintain the security health of
your clients
–  Software updates
–  Security patches
–  Active and current antivirus
Aruba Company
Confidental 46
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 47 #airheadsconf
Detect unsecure
devices
Block access to network resources
across wired, wireless & remote
Auto-Remediate the device
Minimizes Risk to Network
Access Network
ClearPass Policy
Manager with OnGuard
OnGuard - Control Compromised Devices
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 48 #airheadsconf
• All Windows Versions
• A/V, A/S, FW, registry keys, services, patch
Mgmt, processes, peer-to-peer apps, USB
storage devices, Hot Fixes, Hotspots & VMs
• Red Hat, CentOS, Fedora, SUSE
• Status of services, anti-virus and firewall
• Mac OS X
• Status of anti-virus, anti-spyware and firewall
•  Persistent and Dissolvable Agents for laptops/desktops
Supported Endpoint Computers
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 49 #airheadsconf#airheadsconf49
Optimize the Experience
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 50 #airheadsconf
Personalization and Control Required for
Optimal Network Experience
•  Even as WLAN gets faster, there
are new demands on networks
•  Higher Device Density
•  Higher Bandwidth Apps
•  Complete reliance on wireless networks
•  Therefore, the air is a commodity
that must be policed to ensure
productivity
X mb/sec
Ymb/sec
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 51 #airheadsconf
Deep Network Awareness is Essential
•  Application awareness allows
optimization of networking stack
–  Use higher level information to add value at
lower levels
•  Blocking inappropriate
applications from wasting the air
•  Layer 1 adjustments
–  Pause radio scanning for critical apps
•  Layer 2 adjustments
–  Fine grain QoS marking by User and APP to
prioritize use of the air
•  Multicast and Broadcast Control
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 52 #airheadsconf#airheadsconf52
Policy Must Follow User
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 53 #airheadsconf
Remember Universal Policy?
Any DeviceAny User
Employee Contractor
Visitor
PatientShopper
Any App
  Posture
  BYOD
  Corporate
  Time of Day
  External Data
Any DataClearPass Policy Manager
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 54 #airheadsconf
•  Identity Stores – LDAP, Active Directory
•  Controller – mDNS, HTTP Agent Strings, DHCP
requests
•  Active Profiling – SNMP, Nessus
•  Passive Profiling
•  Agent information – Microsoft NAP, OnGuard
•  Time of Day
•  Location
•  Mobile Device Management Systems
ClearPass Context Sources
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 55 #airheadsconf
ClearPass
ClearPass Policy Manager
Orchestrates Policies for all Users and Devices
Mobility
Controller
Mobility Access
Switch
Policy EnforcementPolicy Definition
*New in AOS 7.2
Branch Office
Instant
Assign Preinstalled
Role
Dynamically
Download Role
Dynamically
Download Role
Policy Audit
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 56 #airheadsconf
Application and Data Control Features
Controller AirWave ClearPass
Basic Device ID ✔
Role based app enforcement ✔
Real Time visualization ✔
Guest Portal ✔
Historical visualization and
trending
✔
Fault Identification ✔
Network Wide Policy Enforcement ✔
Advanced Device ID ✔
Dynamic Role Provisioning ✔
Endpoint Policy Enforcement ✔
Advanced Guest Portal ✔
BYOD Device Onboarding ✔
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 57 #airheadsconf
• Complex
• Costly
• Brittle
• High Maintenance
Applications
Management
Supply
Chain
Mgmt
Smart
Grid CRM
HR
ERP
CMDB
SIEM
Asset
Mgmt
IPAM
Infrastructure
Network
Security
DNS,
DHCP
AAA
Switches
Routers
Building
Controls
Factory
Controls
Network
Location
SNMP, Syslog, Netflow
Custom Integration – API’s, Scripts
Current Information Sharing
Approaches
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 58 #airheadsconf
IF-MAP Server
Applications
Management
Supply
Chain
Mgmt
Smart
Grid CRM
HR
ERP
CMDB
SIEM
Asset
Mgmt
IPAM
Infrastructure
Network
Security
DNS,
DHCP
AAA
Switches
Routers
Building
Controls
Factory
Controls
Network
Location
IF-MAP
Protocol
(Publish,
Subscribe,
Search)
Automatically aggregates, correlates, and distributes data
to and from different systems, in real time
IF-MAP: Future of Information Sharing
and Real-Time Policy
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 59 #airheadsconf
11- RADIUS updates firewall policy to block access12- PDP publishes the update to the MAP1- User (John) enters zone 12- Hirsch system publishes to the MAP server3- User requests for access to the network4- PDP publishes to the MAP server5- PDP Subscribes to the MAP server6- PDP grants access to the UNCLASS network7- User connects to the classified network8- User leaves Zone 1, while still logged in
Subscription Update: John in Zone 2
9- Card reader publishes the update to the MAP10- MAP updates PDP about the location change
Use Case – Integrated Network / Physical
Security Solution
Infoblox
MAP Server
Hirsch System
(Physical Sensor)
Publish: John in Zone 1
Publish: John is Authenticated;
Session ID 113:3
Subscribe: Changes to Session 113:3
identity =
John
location =
Zone 1
Access-
request =
113:3
Secure Zone 1
Classified
Network
Publish: John in Zone 2
location =
Zone 2
Publish (delete): John is Authenticated
Access
Request
Grants
Access
Request
Zone 2
MAP Database
authenticated
Policy Violation:
Access Cut Off
CHANGE?CHANGE!
Aruba
Controller
ClearPass Policy Manager (RADIUS)
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 60 #airheadsconf
•  Personalized security and user experience is essential to meeting today’s
information security challenges
•  These personalized policies must be enforced at every network touch point
in a consistent manner to be effective
•  Using an Aruba Networks infrastructure, the process of implementing
personalized security is dramatically simplified
•  Aruba’s vision for the future of networking extends this vision even further
Summary
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 61 #airheadsconf#airheadsconf
Thank You - Questions?
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 62 #airheadsconf#airheadsconf62

Security advanced rich langston_jon green

  • 1.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 1 #airheadsconf#airheadsconf Advanced Security: Protecting Your Network End-to-End with Aruba Networks Personalized Security Rich Langston Jon Green
  • 2.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 2 #airheadsconf •  Traditional Network Security Model Is No Longer Effective •  Personalized, Context Aware Security is the Answer •  Components of Personalized Security •  Implementing Personalized Security Network- wide with Aruba Networks Agenda
  • 3.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 3 #airheadsconf Challenge of Security in the Enterprise Security works toward: •  Reduce the likelihood of an information security breach •  Reduce the impact of any breach or malware outbreak •  Create an audit trail to ensure policy compliance •  Increase the reliability of your network But, we also need to: •  Ensure enterprise-critical apps are always available •  Keep everyone productive •  Allow guests on our network •  Support remote workers just like they are in the office
  • 4.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 4 #airheadsconf Traditional Model Barely Worked Enterprise Perimeter Employees WAN Branch Office Branch Employees Home Offices Internet Data Center Visitors Contractors Enterprise Perimeter
  • 5.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 5 #airheadsconf Over Time, More Holes Appeared Enterprise Perimeter Employees WAN Branch Office Branch Employees Home Offices Internet Data Center Visitors Contractors Enterprise Perimeter Road Warriors Partner Sites
  • 6.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 6 #airheadsconf BYOD and Mobility Break It Enterprise Perimeter Employees BYOD WAN Branch Office Branch Employees Home Offices Internet Data Center Visitors Contractors Enterprise Perimeter
  • 7.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 7 #airheadsconf Personalized, Context Aware Security is The Answer Data Center Peter JuliaPartners Branch Employees Ash Rich Scott Dave Sujatha Contractors Visitors Grace
  • 8.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 8 #airheadsconf Personalized Security Solves Our Problems   Reduce the likelihood of an information security breach   Reduce the impact of any breach or malware outbreak   Create an audit trail to ensure policy compliance   Increase the reliability of your network   Ensure enterprise-critical apps are always available   Keep everyone productive   Allow guests on our network   Support remote workers just like they are in the office
  • 9.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 9 #airheadsconf#airheadsconf9 Prerequisites for Personalized Security
  • 10.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 10 #airheadsconf Prerequisites for Personalized Security 1101010001001111100 Identify the Device and User Classify the Traffic Control Optimize the Experience Follow the UserAccess Secure the Connection Across All Access Methods Instant AP Mobility Access Switch Mobility Controller VPN
  • 11.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 11 #airheadsconf Prerequisites for Personalized Security 1101010001001111100 Identify the Device and User Classify the Traffic Control Optimize the Experience Follow the UserAccess Secure the Connection At All Locations HQ Branch SOHO Road Warrior
  • 12.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 12 #airheadsconf With a Single, Universal policy Any DeviceAny User Employee Contractor Visitor PatientShopper Any App   Posture   BYOD   Corporate   Time of Day   External Data Any Data
  • 13.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 13 #airheadsconf Typical Aruba Network
  • 14.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 14 #airheadsconf Security Architecture Roles ClearPass Policy Manager Mobility Access Switch Controller • Policy  Decision  Point  for  wired  and  wireless   • Authen5ca5on  Server   • Cer5ficate  Authority  for  BYOD   • PDP  in  non-­‐CP  environments   • Policy  Enforcement  Point     • Policy  Enforcement  Points   Branch Office Instant RAP
  • 15.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 15 #airheadsconf AirWave – Complete Network Insight •  Controller sends all events to Airwave •  User authentications •  Wireless Intrusion events •  All application data •  Account for network activity by user, time, date, location •  Who used what applications? When? •  Which applications are taking all my bandwidth? •  Requires AirWave 7.7 or later •  Ensure PCI compliance with built-in reports •  Forensic information for network outage reports
  • 16.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 16 #airheadsconf#airheadsconf16 Personalized Security Step-By-Step
  • 17.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 17 #airheadsconf#airheadsconf17 Universal Encryption Secure the Connection
  • 18.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 18 #airheadsconf WPA2 Enterprise - Strong Over Air Encryption •  Combines strong encryption, including AES-CCMP, with mutual authentication •  Ensures users do not connect to an imposter AP •  Protects the data to the level that the Federal Information Processing Standard requires •  Not subject to the brute force attacks used against weak WPA2 PSK passphrases •  More secure than an open Ethernet port WPA2 Handshake
  • 19.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 19 #airheadsconf •  Short answer: Yes – because of things like rainbow tables, distributed cracking, fast GPUs, etc. •  This is why we use MSCHAPv2 inside a TLS tunnel for Wi-Fi •  Still using PPTP for VPN? Watch out… Isn’t MSCHAPv2 broken?
  • 20.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 20 #airheadsconf Centralized encryption increases security Employee Authentication AuthorizationIdentification Malicious Insider Traditional Distributed Encrytion DisconnectAruba Centralized Encryption
  • 21.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 21 #airheadsconf Mobility Controller ClearPass Policy Manager Branch Office Instant Encryption Extends Everywhere AirWave Management Platform Tu Local MAS LAN Switch Internet LAN Core Remote Office MAS Switch RAP Phone, Laptop, Tablet •  IPSec encryption protects all edge traffic •  Full IKEv2 Support •  Regardless of access method •  VIA •  RAP •  Remote MAS •  Instant •  Local MAS •  Eliminates eavesdropping on the wire IPSec IPSec IPSec IPSec IPSec or GRE
  • 22.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 22 #airheadsconf Aruba VIA Client   Mobile device policy compliance •  End-to-end authenticated and encrypted session to controller •  Automatically detects trusted/untrusted network; establishes connected when needed   Supported devices •  Windows (32/64 bit) •  Apple iOS •  Mac OSX •  Android 4.x •  Linux (April 2013)   Seamless Mobility •  Firewall policies tied to user role •  Same policy as in campus, branch   Best in Class Security •  Supports NSA-approved Suite B cryptography •  IPsec VPN with SSL fallback
  • 23.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 23 #airheadsconf#airheadsconf23 Authenticate Everything
  • 24.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 24 #airheadsconf •  Use Mutual Authentication whenever possible •  Network proves its identity to the client •  Client Proves its identity to the network •  Whenever possible, use single sign on (SSO) strategies •  Not only across network types, but also enterprise apps •  Typically, link LDAP or Active Directory to all enterprise access •  Multiple options for securing identity •  AD Credentials, User based certificates, machine certifications, Multifactor Authentication •  Options for multiple identity stores Strong Authentication of User and Device
  • 25.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 25 #airheadsconf Universal Authentication for Wired, Wireless, and Remote Users Mobility Access SwitchController •  WPA2-Enterprise for wireless security – Includes 802.1X for strong authentication •  Multiple Methods for Wired Authentication – 802.1X – MAC – User Derived Roles
  • 26.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 26 #airheadsconf EAP to RADIUS Server EAPOL (EAP over LAN) RADIUS EAP Session ClearPass PM AP/Controller STA
  • 27.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 27 #airheadsconf Local EAP Termination EAPOL (EAP over LAN) RADIUS/LDAP (optional) EAP Session Authentication Server AP/Controller STA
  • 28.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 28 #airheadsconf •  Strong authentication of user yields their identity and their role •  Strong authentication of the device yields its risk profile •  Allows fine grain assignment of roles and a highly personalized experience Extended Identity is Key to Personal Security Employee Rich Product Management BYOD iPAD Employee Rich Product Management Corp. MacBook + + + +!=
  • 29.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 29 #airheadsconf How do we assign these roles? •  Controller •  Default Roles can be assigned •  Roles can be derived using a few basic traits •  ClearPass •  Roles can be assigned based on the authenticating user and device •  ClearPass profiling •  ClearPass can fingerprint the device using a variety of traits •  This can trigger an onboarding event for quicker, safer authentication next time
  • 30.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 30 #airheadsconf Role Derivation Default Roles • Configurable by authentication method • SSID User Rules • Device-specific attributes • Encryption type • AP used (by name or BSSID) Server Derived Roles • Role assignment based on attributes from ClearPass server • Different access privileges based on security policy • Can use single SSID for all users/ devices • ClearPass advanced profiling • Policy compliance • Real Time event driven
  • 31.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 31 #airheadsconf What Does ClearPass Profile? ClearPass Profiling Smart Devices Laptops/ Desktops Network/ Non Login Devices
  • 32.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 32 #airheadsconf 1. Device type automatically detected & redirected to portal 2. Settings & credentials are auto-configured after user enters domain credentials 3. User automatically placed on proper SSID & network segment ClearPass Device Onboarding
  • 33.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 33 #airheadsconf Granular BYOD Onboarding Controls
  • 34.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 34 #airheadsconf How Can I Use This Information? Device enters network Placed directly into restricted role Placed in onboarding role, complete onboarding process Typically, assign very low privilege role. Perhaps a remediation role Typically, assign to higher access role Corp. device directly placed in correct role Typically, full access to their needed resources Profile device Problem Compliant, Successful Compliant Non-Compliant
  • 35.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 35 #airheadsconf How do I safely give Guests Network access Controller-based Guest Access –  Customizable welcome page –  Flexible authentication options ClearPass based Guest Access –  Highly customizable –  Advertising options –  Self registration –  Sponsored registration –  Preregistration Aruba Company Confidental 35
  • 36.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 36 #airheadsconf Access Network 1. Sponsor creates guest credentials ClearPass Policy Manager 2. Account enabled, visitor notified VIA screen, SMS, or email 3. User logs in when they arrive New Guest Sponsor Example: Sponsor Registration
  • 37.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 37 #airheadsconf#airheadsconf37 Control Access
  • 38.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 38 #airheadsconf Typical Roles Guest Contractor Doctor Students Faculty Employee Employee – BYOD Corporate Mobile Device Unified Communications Infrastructure Aruba Company Confidental 38
  • 39.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 39 #airheadsconf Multiple classes of users on same infrastructure easily separated AAA Services RADIUS, LDAP, AD Security Services Anti-Virus, IPS, URL Filtering Access On-Ramps Access Point SSID: Corp Access Point SSID: GUEST S2500/3500 Wired Ports Mobility Controller QoSFW QoSFW QoSFW QoSFW QoSFWGuest Mobile Device VoIP Device Contractor Employee Role-Based Security Role-based Access Control
  • 40.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 40 #airheadsconf Why Worry About Authorization? Where is the “network perimeter” today?   Mobility brings us:   Disappearance of physical security   New mobile users, devices appearing everyday   Increased exposure to malware   Assuming that “the bad guys are outside the firewall, the good guys are inside” is a recipe for disaster We meet again, Agent 99!
  • 41.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 41 #airheadsconf VLAN-Based Security Can’t Scale MAC, IP – User Mapping User – VLAN Mapping VLAN – Policy Mapping •  User identity is based on MAC or IP address (weak identities – like a boarding pass) •  Maintaining VLAN/Role mappings across a large network is very difficult •  User identity can be spoofed which means ACL can be violated
  • 42.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 42 #airheadsconf Session Processing –  Identity-based firewall policies –  MAC Address – IP Address – VLAN – User Name – User Role – Firewall Policies binding –  Traffic Management Protocol Processing –  ALG for SIP, RTSP, FTP, TFTP, SCCP, Vocera, ICMP –  Intrusion/DoS Detection and Prevention –  Detects SYN, ping, ports scan attacks –  Can prevent continued attacks (black list station) –  Enforces TCP handshakes, prevents replay attacks Station Blacklisting –  Authentication Failure –  Firewall Rule Violation –  TCP Attacks ICSA Certified Aruba Policy Enforcement Firewall Context Aware, Identity Based
  • 43.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 43 #airheadsconf AppRF Application Monitoring and Control •  New “Firewall” Dashboard UI •  Includes summary views of activity by Users, Devices, Destinations, Applications, WLANs, Roles •  Allows drilling down into details of each
  • 44.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 44 #airheadsconf Real-Time Application Control •  Dynamic web-application prioritization •  Use roles to limit or QoS applications •  Real Time ACLs updated whenever user tries to use app •  ACLs can block, QoS, log, mirror traffic, pause scanning •  No impact on throughput Soon: •  Config stubs for common web-based applications Detect Application Create ACL Assign To Roll User triggers update Traffic blocked/ QoS adjusted
  • 45.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 45 #airheadsconf Built in CA for BYOD Device Access Revocation Revoke Device Network Access Device Inventory Data Built in CA
  • 46.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 46 #airheadsconf What about compromised devices? In order to maintain the reliability of your network, it’s important to maintain the security health of your clients –  Software updates –  Security patches –  Active and current antivirus Aruba Company Confidental 46
  • 47.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 47 #airheadsconf Detect unsecure devices Block access to network resources across wired, wireless & remote Auto-Remediate the device Minimizes Risk to Network Access Network ClearPass Policy Manager with OnGuard OnGuard - Control Compromised Devices
  • 48.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 48 #airheadsconf • All Windows Versions • A/V, A/S, FW, registry keys, services, patch Mgmt, processes, peer-to-peer apps, USB storage devices, Hot Fixes, Hotspots & VMs • Red Hat, CentOS, Fedora, SUSE • Status of services, anti-virus and firewall • Mac OS X • Status of anti-virus, anti-spyware and firewall •  Persistent and Dissolvable Agents for laptops/desktops Supported Endpoint Computers
  • 49.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 49 #airheadsconf#airheadsconf49 Optimize the Experience
  • 50.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 50 #airheadsconf Personalization and Control Required for Optimal Network Experience •  Even as WLAN gets faster, there are new demands on networks •  Higher Device Density •  Higher Bandwidth Apps •  Complete reliance on wireless networks •  Therefore, the air is a commodity that must be policed to ensure productivity X mb/sec Ymb/sec
  • 51.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 51 #airheadsconf Deep Network Awareness is Essential •  Application awareness allows optimization of networking stack –  Use higher level information to add value at lower levels •  Blocking inappropriate applications from wasting the air •  Layer 1 adjustments –  Pause radio scanning for critical apps •  Layer 2 adjustments –  Fine grain QoS marking by User and APP to prioritize use of the air •  Multicast and Broadcast Control Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7
  • 52.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 52 #airheadsconf#airheadsconf52 Policy Must Follow User
  • 53.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 53 #airheadsconf Remember Universal Policy? Any DeviceAny User Employee Contractor Visitor PatientShopper Any App   Posture   BYOD   Corporate   Time of Day   External Data Any DataClearPass Policy Manager
  • 54.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 54 #airheadsconf •  Identity Stores – LDAP, Active Directory •  Controller – mDNS, HTTP Agent Strings, DHCP requests •  Active Profiling – SNMP, Nessus •  Passive Profiling •  Agent information – Microsoft NAP, OnGuard •  Time of Day •  Location •  Mobile Device Management Systems ClearPass Context Sources
  • 55.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 55 #airheadsconf ClearPass ClearPass Policy Manager Orchestrates Policies for all Users and Devices Mobility Controller Mobility Access Switch Policy EnforcementPolicy Definition *New in AOS 7.2 Branch Office Instant Assign Preinstalled Role Dynamically Download Role Dynamically Download Role Policy Audit
  • 56.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 56 #airheadsconf Application and Data Control Features Controller AirWave ClearPass Basic Device ID ✔ Role based app enforcement ✔ Real Time visualization ✔ Guest Portal ✔ Historical visualization and trending ✔ Fault Identification ✔ Network Wide Policy Enforcement ✔ Advanced Device ID ✔ Dynamic Role Provisioning ✔ Endpoint Policy Enforcement ✔ Advanced Guest Portal ✔ BYOD Device Onboarding ✔
  • 57.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 57 #airheadsconf • Complex • Costly • Brittle • High Maintenance Applications Management Supply Chain Mgmt Smart Grid CRM HR ERP CMDB SIEM Asset Mgmt IPAM Infrastructure Network Security DNS, DHCP AAA Switches Routers Building Controls Factory Controls Network Location SNMP, Syslog, Netflow Custom Integration – API’s, Scripts Current Information Sharing Approaches
  • 58.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 58 #airheadsconf IF-MAP Server Applications Management Supply Chain Mgmt Smart Grid CRM HR ERP CMDB SIEM Asset Mgmt IPAM Infrastructure Network Security DNS, DHCP AAA Switches Routers Building Controls Factory Controls Network Location IF-MAP Protocol (Publish, Subscribe, Search) Automatically aggregates, correlates, and distributes data to and from different systems, in real time IF-MAP: Future of Information Sharing and Real-Time Policy
  • 59.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 59 #airheadsconf 11- RADIUS updates firewall policy to block access12- PDP publishes the update to the MAP1- User (John) enters zone 12- Hirsch system publishes to the MAP server3- User requests for access to the network4- PDP publishes to the MAP server5- PDP Subscribes to the MAP server6- PDP grants access to the UNCLASS network7- User connects to the classified network8- User leaves Zone 1, while still logged in Subscription Update: John in Zone 2 9- Card reader publishes the update to the MAP10- MAP updates PDP about the location change Use Case – Integrated Network / Physical Security Solution Infoblox MAP Server Hirsch System (Physical Sensor) Publish: John in Zone 1 Publish: John is Authenticated; Session ID 113:3 Subscribe: Changes to Session 113:3 identity = John location = Zone 1 Access- request = 113:3 Secure Zone 1 Classified Network Publish: John in Zone 2 location = Zone 2 Publish (delete): John is Authenticated Access Request Grants Access Request Zone 2 MAP Database authenticated Policy Violation: Access Cut Off CHANGE?CHANGE! Aruba Controller ClearPass Policy Manager (RADIUS)
  • 60.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 60 #airheadsconf •  Personalized security and user experience is essential to meeting today’s information security challenges •  These personalized policies must be enforced at every network touch point in a consistent manner to be effective •  Using an Aruba Networks infrastructure, the process of implementing personalized security is dramatically simplified •  Aruba’s vision for the future of networking extends this vision even further Summary
  • 61.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 61 #airheadsconf#airheadsconf Thank You - Questions?
  • 62.
    CONFIDENTIAL © Copyright 2013.Aruba Networks, Inc. All rights reserved 62 #airheadsconf#airheadsconf62