SlideShare a Scribd company logo
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 1 #airheadsconf#airheadsconf
Advanced Security:
Protecting Your Network End-to-End with
Aruba Networks Personalized Security
Rich Langston
Jon Green
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 2 #airheadsconf
•  Traditional Network Security Model Is No
Longer Effective
•  Personalized, Context Aware Security is the
Answer
•  Components of Personalized Security
•  Implementing Personalized Security Network-
wide with Aruba Networks
Agenda
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 3 #airheadsconf
Challenge of Security in the Enterprise
Security works toward:
•  Reduce the likelihood of an information security breach
•  Reduce the impact of any breach or malware outbreak
•  Create an audit trail to ensure policy compliance
•  Increase the reliability of your network
But, we also need to:
•  Ensure enterprise-critical apps are always available
•  Keep everyone productive
•  Allow guests on our network
•  Support remote workers just like they are in the office
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 4 #airheadsconf
Traditional Model Barely Worked
Enterprise Perimeter
Employees
WAN
Branch Office
Branch
Employees
Home Offices
Internet
Data Center
Visitors
Contractors
Enterprise Perimeter
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 5 #airheadsconf
Over Time, More Holes Appeared
Enterprise Perimeter
Employees
WAN
Branch Office
Branch
Employees
Home Offices
Internet
Data Center
Visitors
Contractors
Enterprise Perimeter
Road
Warriors
Partner Sites
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 6 #airheadsconf
BYOD and Mobility Break It
Enterprise Perimeter
Employees
BYOD
WAN
Branch Office
Branch
Employees
Home Offices
Internet
Data Center
Visitors
Contractors
Enterprise Perimeter
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 7 #airheadsconf
Personalized, Context Aware
Security is The Answer
Data Center
Peter
JuliaPartners
Branch
Employees
Ash
Rich
Scott
Dave
Sujatha
Contractors
Visitors
Grace
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 8 #airheadsconf
Personalized Security Solves Our
Problems
  Reduce the likelihood of an information security breach
  Reduce the impact of any breach or malware outbreak
  Create an audit trail to ensure policy compliance
  Increase the reliability of your network
  Ensure enterprise-critical apps are always available
  Keep everyone productive
  Allow guests on our network
  Support remote workers just like they are in the office
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 9 #airheadsconf#airheadsconf9
Prerequisites for Personalized
Security
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 10 #airheadsconf
Prerequisites for Personalized Security
1101010001001111100
Identify
the Device
and User
Classify
the Traffic
Control Optimize
the Experience
Follow
the UserAccess
Secure
the
Connection
Across All Access Methods
Instant
AP
Mobility Access
Switch
Mobility
Controller
VPN
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 11 #airheadsconf
Prerequisites for Personalized Security
1101010001001111100
Identify
the Device
and User
Classify
the Traffic
Control Optimize
the Experience
Follow
the UserAccess
Secure
the
Connection
At All Locations
HQ Branch SOHO Road Warrior
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 12 #airheadsconf
With a Single, Universal policy
Any DeviceAny User
Employee Contractor
Visitor
PatientShopper
Any App
  Posture
  BYOD
  Corporate
  Time of Day
  External Data
Any Data
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 13 #airheadsconf
Typical Aruba Network
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 14 #airheadsconf
Security Architecture Roles
ClearPass Policy Manager
Mobility Access Switch
Controller
• Policy  Decision  Point  for  wired  and  wireless  
• Authen5ca5on  Server  
• Cer5ficate  Authority  for  BYOD  
• PDP  in  non-­‐CP  environments  
• Policy  Enforcement  Point    
• Policy  Enforcement  Points  
Branch Office Instant RAP
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 15 #airheadsconf
AirWave – Complete Network Insight
•  Controller sends all events to Airwave
•  User authentications
•  Wireless Intrusion events
•  All application data
•  Account for network activity by user, time, date,
location
•  Who used what applications? When?
•  Which applications are taking all my bandwidth?
•  Requires AirWave 7.7 or later
•  Ensure PCI compliance with built-in reports
•  Forensic information for network outage reports
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 16 #airheadsconf#airheadsconf16
Personalized Security Step-By-Step
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 17 #airheadsconf#airheadsconf17
Universal Encryption
Secure
the
Connection
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 18 #airheadsconf
WPA2 Enterprise - Strong Over Air
Encryption
•  Combines strong encryption,
including AES-CCMP, with mutual
authentication
•  Ensures users do not connect to an
imposter AP
•  Protects the data to the level that the
Federal Information Processing Standard
requires
•  Not subject to the brute force
attacks used against weak WPA2
PSK passphrases
•  More secure than an open
Ethernet port
WPA2 Handshake
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 19 #airheadsconf
•  Short answer: Yes – because of things like
rainbow tables, distributed cracking, fast GPUs,
etc.
•  This is why we use MSCHAPv2 inside a TLS
tunnel for Wi-Fi
•  Still using PPTP for VPN? Watch out…
Isn’t MSCHAPv2 broken?
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 20 #airheadsconf
Centralized encryption increases security
Employee
Authentication
AuthorizationIdentification
Malicious Insider
Traditional Distributed
Encrytion
DisconnectAruba Centralized Encryption
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 21 #airheadsconf
Mobility
Controller
ClearPass Policy
Manager
Branch Office Instant
Encryption Extends Everywhere
AirWave
Management
Platform
Tu
Local MAS LAN Switch
Internet
LAN Core
Remote Office MAS Switch
RAP
Phone, Laptop, Tablet
•  IPSec encryption
protects all edge
traffic
•  Full IKEv2 Support
•  Regardless of
access method
•  VIA
•  RAP
•  Remote MAS
•  Instant
•  Local MAS
•  Eliminates
eavesdropping on
the wire
IPSec
IPSec
IPSec
IPSec
IPSec or GRE
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 22 #airheadsconf
Aruba VIA Client
  Mobile device policy compliance
•  End-to-end authenticated and encrypted session
to controller
•  Automatically detects trusted/untrusted network;
establishes connected when needed
  Supported devices
•  Windows (32/64 bit)
•  Apple iOS
•  Mac OSX
•  Android 4.x
•  Linux (April 2013)
  Seamless Mobility
•  Firewall policies tied to user role
•  Same policy as in campus, branch
  Best in Class Security
•  Supports NSA-approved Suite B
cryptography
•  IPsec VPN with SSL fallback
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 23 #airheadsconf#airheadsconf23
Authenticate Everything
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 24 #airheadsconf
•  Use Mutual Authentication whenever possible
•  Network proves its identity to the client
•  Client Proves its identity to the network
•  Whenever possible, use single sign on (SSO)
strategies
•  Not only across network types, but also enterprise apps
•  Typically, link LDAP or Active Directory to all enterprise access
•  Multiple options for securing identity
•  AD Credentials, User based certificates, machine
certifications, Multifactor Authentication
•  Options for multiple identity stores
Strong Authentication of User and Device
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 25 #airheadsconf
Universal Authentication for Wired,
Wireless, and Remote Users
Mobility Access SwitchController
•  WPA2-Enterprise for wireless security
– Includes 802.1X for strong authentication
•  Multiple Methods for Wired Authentication
– 802.1X
– MAC
– User Derived Roles
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 26 #airheadsconf
EAP to RADIUS Server
EAPOL (EAP over LAN) RADIUS
EAP Session
ClearPass
PM
AP/Controller
STA
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 27 #airheadsconf
Local EAP Termination
EAPOL (EAP over LAN) RADIUS/LDAP (optional)
EAP Session
Authentication
Server
AP/Controller
STA
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 28 #airheadsconf
•  Strong authentication of user yields their identity
and their role
•  Strong authentication of the device yields its risk
profile
•  Allows fine grain assignment of roles and a
highly personalized experience
Extended Identity is Key to Personal
Security
Employee
Rich
Product
Management
BYOD iPAD Employee
Rich
Product
Management
Corp. MacBook
+ + + +!=
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 29 #airheadsconf
How do we assign these roles?
•  Controller
•  Default Roles can be assigned
•  Roles can be derived using a few basic traits
•  ClearPass
•  Roles can be assigned based on the authenticating user and
device
•  ClearPass profiling
•  ClearPass can fingerprint the device using a variety of traits
•  This can trigger an onboarding event for quicker, safer
authentication next time
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 30 #airheadsconf
Role Derivation
Default
Roles
• Configurable by authentication method
• SSID
User
Rules
• Device-specific attributes
• Encryption type
• AP used (by name or BSSID)
Server
Derived
Roles
• Role assignment based on attributes
from ClearPass server
• Different access privileges based on
security policy
• Can use single SSID for all users/
devices
• ClearPass advanced profiling
• Policy compliance
• Real Time event driven
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 31 #airheadsconf
What Does ClearPass Profile?
ClearPass
Profiling
Smart
Devices
Laptops/
Desktops
Network/
Non Login
Devices
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 32 #airheadsconf
1. Device type
automatically
detected &
redirected to
portal
2. Settings &
credentials are
auto-configured
after user enters
domain credentials
3. User
automatically
placed on proper
SSID & network
segment
ClearPass Device Onboarding
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 33 #airheadsconf
Granular BYOD Onboarding Controls
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 34 #airheadsconf
How Can I Use This Information?
Device
enters
network
Placed directly
into restricted
role
Placed in
onboarding
role, complete
onboarding
process
Typically, assign
very low privilege
role. Perhaps a
remediation role
Typically,
assign to
higher access
role
Corp. device
directly placed
in correct role
Typically, full
access to their
needed
resources
Profile
device
Problem
Compliant, Successful
Compliant
Non-Compliant
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 35 #airheadsconf
How do I safely give Guests Network
access
Controller-based Guest Access
–  Customizable welcome page
–  Flexible authentication options
ClearPass based Guest Access
–  Highly customizable
–  Advertising options
–  Self registration
–  Sponsored registration
–  Preregistration
Aruba Company
Confidental 35
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 36 #airheadsconf
Access Network
1. Sponsor creates
guest credentials
ClearPass Policy
Manager
2. Account enabled,
visitor notified VIA
screen, SMS, or email
3. User logs in
when they arrive
New Guest
Sponsor
Example: Sponsor Registration
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 37 #airheadsconf#airheadsconf37
Control Access
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 38 #airheadsconf
Typical Roles
Guest
Contractor
Doctor
Students
Faculty
Employee
Employee – BYOD
Corporate Mobile Device
Unified Communications
Infrastructure
Aruba Company
Confidental 38
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 39 #airheadsconf
Multiple classes of users on same
infrastructure easily separated
AAA Services
RADIUS, LDAP, AD
Security Services
Anti-Virus, IPS, URL Filtering
Access On-Ramps
Access Point
SSID: Corp
Access Point
SSID: GUEST
S2500/3500
Wired Ports
Mobility Controller
QoSFW
QoSFW
QoSFW
QoSFW
QoSFWGuest
Mobile Device
VoIP Device
Contractor
Employee
Role-Based Security
Role-based Access Control
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 40 #airheadsconf
Why Worry About Authorization?
Where is the “network perimeter” today?
  Mobility brings us:
  Disappearance of physical
security
  New mobile users, devices
appearing everyday
  Increased exposure to
malware
  Assuming that “the bad guys
are outside the firewall, the
good guys are inside” is a
recipe for disaster
We meet
again, Agent
99!
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 41 #airheadsconf
VLAN-Based Security Can’t Scale
MAC, IP –
User
Mapping
User –
VLAN
Mapping
VLAN –
Policy
Mapping
•  User identity is based on MAC or IP address
(weak identities – like a boarding pass)
•  Maintaining VLAN/Role mappings across a
large network is very difficult
•  User identity can be spoofed which means
ACL can be violated
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 42 #airheadsconf
Session Processing
–  Identity-based firewall policies
–  MAC Address – IP Address – VLAN – User Name – User Role – Firewall
Policies binding
–  Traffic Management
Protocol Processing
–  ALG for SIP, RTSP, FTP, TFTP, SCCP, Vocera, ICMP
–  Intrusion/DoS Detection and Prevention
–  Detects SYN, ping, ports scan attacks
–  Can prevent continued attacks (black list station)
–  Enforces TCP handshakes, prevents replay attacks
Station Blacklisting
–  Authentication Failure
–  Firewall Rule Violation
–  TCP Attacks
ICSA Certified
Aruba Policy Enforcement Firewall
Context Aware, Identity Based
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 43 #airheadsconf
AppRF Application Monitoring and
Control
•  New “Firewall” Dashboard UI
•  Includes summary views of activity by Users, Devices, Destinations,
Applications, WLANs, Roles
•  Allows drilling down into details of each
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 44 #airheadsconf
Real-Time Application Control
•  Dynamic web-application
prioritization
•  Use roles to limit or QoS
applications
•  Real Time ACLs updated
whenever user tries to use
app
•  ACLs can block, QoS, log,
mirror traffic, pause
scanning
•  No impact on throughput
Soon:
•  Config stubs for common
web-based applications
Detect
Application
Create ACL
Assign To Roll
User triggers
update
Traffic blocked/
QoS adjusted
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 45 #airheadsconf
Built in CA for BYOD Device Access
Revocation
Revoke Device
Network Access
Device
Inventory Data
Built in CA
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 46 #airheadsconf
What about compromised devices?
In order to maintain the reliability of your network,
it’s important to maintain the security health of
your clients
–  Software updates
–  Security patches
–  Active and current antivirus
Aruba Company
Confidental 46
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 47 #airheadsconf
Detect unsecure
devices
Block access to network resources
across wired, wireless & remote
Auto-Remediate the device
Minimizes Risk to Network
Access Network
ClearPass Policy
Manager with OnGuard
OnGuard - Control Compromised Devices
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 48 #airheadsconf
• All Windows Versions
• A/V, A/S, FW, registry keys, services, patch
Mgmt, processes, peer-to-peer apps, USB
storage devices, Hot Fixes, Hotspots & VMs
• Red Hat, CentOS, Fedora, SUSE
• Status of services, anti-virus and firewall
• Mac OS X
• Status of anti-virus, anti-spyware and firewall
•  Persistent and Dissolvable Agents for laptops/desktops
Supported Endpoint Computers
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 49 #airheadsconf#airheadsconf49
Optimize the Experience
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 50 #airheadsconf
Personalization and Control Required for
Optimal Network Experience
•  Even as WLAN gets faster, there
are new demands on networks
•  Higher Device Density
•  Higher Bandwidth Apps
•  Complete reliance on wireless networks
•  Therefore, the air is a commodity
that must be policed to ensure
productivity
X mb/sec
Ymb/sec
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 51 #airheadsconf
Deep Network Awareness is Essential
•  Application awareness allows
optimization of networking stack
–  Use higher level information to add value at
lower levels
•  Blocking inappropriate
applications from wasting the air
•  Layer 1 adjustments
–  Pause radio scanning for critical apps
•  Layer 2 adjustments
–  Fine grain QoS marking by User and APP to
prioritize use of the air
•  Multicast and Broadcast Control
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 52 #airheadsconf#airheadsconf52
Policy Must Follow User
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 53 #airheadsconf
Remember Universal Policy?
Any DeviceAny User
Employee Contractor
Visitor
PatientShopper
Any App
  Posture
  BYOD
  Corporate
  Time of Day
  External Data
Any DataClearPass Policy Manager
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 54 #airheadsconf
•  Identity Stores – LDAP, Active Directory
•  Controller – mDNS, HTTP Agent Strings, DHCP
requests
•  Active Profiling – SNMP, Nessus
•  Passive Profiling
•  Agent information – Microsoft NAP, OnGuard
•  Time of Day
•  Location
•  Mobile Device Management Systems
ClearPass Context Sources
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 55 #airheadsconf
ClearPass
ClearPass Policy Manager
Orchestrates Policies for all Users and Devices
Mobility
Controller
Mobility Access
Switch
Policy EnforcementPolicy Definition
*New in AOS 7.2
Branch Office
Instant
Assign Preinstalled
Role
Dynamically
Download Role
Dynamically
Download Role
Policy Audit
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 56 #airheadsconf
Application and Data Control Features
Controller AirWave ClearPass
Basic Device ID ✔
Role based app enforcement ✔
Real Time visualization ✔
Guest Portal ✔
Historical visualization and
trending
✔
Fault Identification ✔
Network Wide Policy Enforcement ✔
Advanced Device ID ✔
Dynamic Role Provisioning ✔
Endpoint Policy Enforcement ✔
Advanced Guest Portal ✔
BYOD Device Onboarding ✔
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 57 #airheadsconf
• Complex
• Costly
• Brittle
• High Maintenance
Applications
Management
Supply
Chain
Mgmt
Smart
Grid CRM
HR
ERP
CMDB
SIEM
Asset
Mgmt
IPAM
Infrastructure
Network
Security
DNS,
DHCP
AAA
Switches
Routers
Building
Controls
Factory
Controls
Network
Location
SNMP, Syslog, Netflow
Custom Integration – API’s, Scripts
Current Information Sharing
Approaches
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 58 #airheadsconf
IF-MAP Server
Applications
Management
Supply
Chain
Mgmt
Smart
Grid CRM
HR
ERP
CMDB
SIEM
Asset
Mgmt
IPAM
Infrastructure
Network
Security
DNS,
DHCP
AAA
Switches
Routers
Building
Controls
Factory
Controls
Network
Location
IF-MAP
Protocol
(Publish,
Subscribe,
Search)
Automatically aggregates, correlates, and distributes data
to and from different systems, in real time
IF-MAP: Future of Information Sharing
and Real-Time Policy
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 59 #airheadsconf
11- RADIUS updates firewall policy to block access12- PDP publishes the update to the MAP1- User (John) enters zone 12- Hirsch system publishes to the MAP server3- User requests for access to the network4- PDP publishes to the MAP server5- PDP Subscribes to the MAP server6- PDP grants access to the UNCLASS network7- User connects to the classified network8- User leaves Zone 1, while still logged in
Subscription Update: John in Zone 2
9- Card reader publishes the update to the MAP10- MAP updates PDP about the location change
Use Case – Integrated Network / Physical
Security Solution
Infoblox
MAP Server
Hirsch System
(Physical Sensor)
Publish: John in Zone 1
Publish: John is Authenticated;
Session ID 113:3
Subscribe: Changes to Session 113:3
identity =
John
location =
Zone 1
Access-
request =
113:3
Secure Zone 1
Classified
Network
Publish: John in Zone 2
location =
Zone 2
Publish (delete): John is Authenticated
Access
Request
Grants
Access
Request
Zone 2
MAP Database
authenticated
Policy Violation:
Access Cut Off
CHANGE?CHANGE!
Aruba
Controller
ClearPass Policy Manager (RADIUS)
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 60 #airheadsconf
•  Personalized security and user experience is essential to meeting today’s
information security challenges
•  These personalized policies must be enforced at every network touch point
in a consistent manner to be effective
•  Using an Aruba Networks infrastructure, the process of implementing
personalized security is dramatically simplified
•  Aruba’s vision for the future of networking extends this vision even further
Summary
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 61 #airheadsconf#airheadsconf
Thank You - Questions?
CONFIDENTIAL
© Copyright 2013. Aruba Networks, Inc.
All rights reserved 62 #airheadsconf#airheadsconf62

More Related Content

What's hot

Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Aruba, a Hewlett Packard Enterprise company
 
8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...Aruba, a Hewlett Packard Enterprise company
 

What's hot (20)

2012 ah vegas deploying byod
2012 ah vegas   deploying byod2012 ah vegas   deploying byod
2012 ah vegas deploying byod
 
Wlan designfor highdensityenvironments_chuck lukaszewski
Wlan designfor highdensityenvironments_chuck lukaszewskiWlan designfor highdensityenvironments_chuck lukaszewski
Wlan designfor highdensityenvironments_chuck lukaszewski
 
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
 
Mobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjaliMobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjali
 
2012 ah emea advanced mobility design
2012 ah emea   advanced mobility design2012 ah emea   advanced mobility design
2012 ah emea advanced mobility design
 
2012 ah apj mobile device fundamentals
2012 ah apj   mobile device fundamentals2012 ah apj   mobile device fundamentals
2012 ah apj mobile device fundamentals
 
Cisco switch setup with cppm v1.2
Cisco switch setup with cppm v1.2Cisco switch setup with cppm v1.2
Cisco switch setup with cppm v1.2
 
Air heads rio 2010 aruba pef overview
Air heads rio 2010   aruba pef overviewAir heads rio 2010   aruba pef overview
Air heads rio 2010 aruba pef overview
 
Outdoor network engineering jeffrey weaver
Outdoor network engineering jeffrey weaverOutdoor network engineering jeffrey weaver
Outdoor network engineering jeffrey weaver
 
Airheads dallas 2011 wireless security
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless security
 
2012 ah apj deploying byod
2012 ah apj   deploying byod2012 ah apj   deploying byod
2012 ah apj deploying byod
 
Building an aruba proof of concept lab javier urtubia
Building an aruba proof of concept lab javier urtubiaBuilding an aruba proof of concept lab javier urtubia
Building an aruba proof of concept lab javier urtubia
 
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
Byod and guest access workshop enabling byod carlos gomez gallego_network ser...
 
2012 ah vegas mobile device fundamentals
2012 ah vegas   mobile device fundamentals2012 ah vegas   mobile device fundamentals
2012 ah vegas mobile device fundamentals
 
Airheads scottsdale 2010 maximizing 11n performance
Airheads scottsdale 2010   maximizing 11n performanceAirheads scottsdale 2010   maximizing 11n performance
Airheads scottsdale 2010 maximizing 11n performance
 
1 voice and video over wi fi-balajee krishnamurthy
1 voice and video over wi fi-balajee krishnamurthy1 voice and video over wi fi-balajee krishnamurthy
1 voice and video over wi fi-balajee krishnamurthy
 
2012 ah vegas wlan design fundamentals
2012 ah vegas   wlan design fundamentals2012 ah vegas   wlan design fundamentals
2012 ah vegas wlan design fundamentals
 
2 top10 tips from aruba tac rizwan shaikh
2 top10 tips from aruba tac rizwan shaikh2 top10 tips from aruba tac rizwan shaikh
2 top10 tips from aruba tac rizwan shaikh
 
Next generation remote networks aruba instant gokul rajagopalan
Next generation remote networks aruba instant gokul rajagopalanNext generation remote networks aruba instant gokul rajagopalan
Next generation remote networks aruba instant gokul rajagopalan
 
8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...8 software defined networking and traffic engineering partha narasimhan_ash c...
8 software defined networking and traffic engineering partha narasimhan_ash c...
 

Viewers also liked

Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...Aruba, a Hewlett Packard Enterprise company
 

Viewers also liked (20)

Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
Case study migrating 1800 a ps to 7240 mobility controllers_douglas burke_ste...
 
Clear pass access management basics zach jennings
Clear pass access management basics zach jenningsClear pass access management basics zach jennings
Clear pass access management basics zach jennings
 
Guest wlan via gu iv3
Guest wlan via gu iv3Guest wlan via gu iv3
Guest wlan via gu iv3
 
Spectralink airheads 2013
Spectralink airheads 2013Spectralink airheads 2013
Spectralink airheads 2013
 
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...Security intermediate  practical cryptography_certs_and 802.1_x_rich langston...
Security intermediate practical cryptography_certs_and 802.1_x_rich langston...
 
Gigabit wifi 802.11 ac in depth_peter thornycroft
Gigabit wifi 802.11 ac in depth_peter thornycroftGigabit wifi 802.11 ac in depth_peter thornycroft
Gigabit wifi 802.11 ac in depth_peter thornycroft
 
Aruba instant the easy button for wireless gokul rajagopalan
Aruba instant the easy button for wireless gokul rajagopalanAruba instant the easy button for wireless gokul rajagopalan
Aruba instant the easy button for wireless gokul rajagopalan
 
2012 ah vegas top10 tips from aruba tac
2012 ah vegas   top10 tips from aruba tac2012 ah vegas   top10 tips from aruba tac
2012 ah vegas top10 tips from aruba tac
 
Aruba webinar dorm wi fi design v4
Aruba webinar   dorm wi fi design v4Aruba webinar   dorm wi fi design v4
Aruba webinar dorm wi fi design v4
 
Mac authentication amigopod radius
Mac authentication amigopod radiusMac authentication amigopod radius
Mac authentication amigopod radius
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
2012 ah apj guest access fundamentals
2012 ah apj   guest access fundamentals2012 ah apj   guest access fundamentals
2012 ah apj guest access fundamentals
 
Do d directives regarding wireless lan
Do d directives regarding wireless lanDo d directives regarding wireless lan
Do d directives regarding wireless lan
 
2012 ah vegas remote networking fundamentals
2012 ah vegas   remote networking fundamentals2012 ah vegas   remote networking fundamentals
2012 ah vegas remote networking fundamentals
 
Hello instant 0612_1a
Hello instant 0612_1aHello instant 0612_1a
Hello instant 0612_1a
 
2012 ah vegas unified access fundamentals
2012 ah vegas   unified access fundamentals2012 ah vegas   unified access fundamentals
2012 ah vegas unified access fundamentals
 
Creating an 802 1 xv3
Creating an 802 1 xv3Creating an 802 1 xv3
Creating an 802 1 xv3
 
Air waveupdate sujathamandava
Air waveupdate sujathamandavaAir waveupdate sujathamandava
Air waveupdate sujathamandava
 
Instant overview gokul_rajagopalan
Instant overview gokul_rajagopalanInstant overview gokul_rajagopalan
Instant overview gokul_rajagopalan
 
Advanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter laneAdvanced rf troubleshooting_peter lane
Advanced rf troubleshooting_peter lane
 

Similar to Security advanced rich langston_jon green

Secure Enterprise Mobility
Secure Enterprise MobilitySecure Enterprise Mobility
Breakout - Airheads Macau 2013 - Cloud WiFi
Breakout - Airheads Macau 2013 - Cloud WiFiBreakout - Airheads Macau 2013 - Cloud WiFi
Breakout - Airheads Macau 2013 - Cloud WiFi
Aruba, a Hewlett Packard Enterprise company
 
Shanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPassShanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPass
Aruba, a Hewlett Packard Enterprise company
 
Adaptive Trust Security
Adaptive Trust SecurityAdaptive Trust Security
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Aruba, a Hewlett Packard Enterprise company
 
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf ItalyAdvanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
Aruba, a Hewlett Packard Enterprise company
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
Aruba, a Hewlett Packard Enterprise company
 
aruba network
aruba networkaruba network
aruba network
Leo Thiha
 
asdasdsadsadasdasdaddasdasdasdasdweqweqewqe
asdasdsadsadasdasdaddasdasdasdasdweqweqewqeasdasdsadsadasdasdaddasdasdasdasdweqweqewqe
asdasdsadsadasdasdaddasdasdasdasdweqweqewqe
almondzzzz938
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera Technologies
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
Aruba, a Hewlett Packard Enterprise company
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
NTS UK - Part of Capita
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01Sergiy Pitel
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
Digital Bond
 

Similar to Security advanced rich langston_jon green (20)

Secure Enterprise Mobility
Secure Enterprise MobilitySecure Enterprise Mobility
Secure Enterprise Mobility
 
Breakout - Airheads Macau 2013 - Cloud WiFi
Breakout - Airheads Macau 2013 - Cloud WiFiBreakout - Airheads Macau 2013 - Cloud WiFi
Breakout - Airheads Macau 2013 - Cloud WiFi
 
Shanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPassShanghai Breakout: Access Management with Aruba ClearPass
Shanghai Breakout: Access Management with Aruba ClearPass
 
Adaptive Trust Security
Adaptive Trust SecurityAdaptive Trust Security
Adaptive Trust Security
 
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
Breakout - Airheads Macau 2013 - ClearPass Access Management Basics
 
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf ItalyAdvanced Access Management with Aruba ClearPass #AirheadsConf Italy
Advanced Access Management with Aruba ClearPass #AirheadsConf Italy
 
Defining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access NetworksDefining Advanced AAA Policies for Access Networks
Defining Advanced AAA Policies for Access Networks
 
aruba network
aruba networkaruba network
aruba network
 
3 air wave practical workshop_mike bruno_matt sidhu
3 air wave practical workshop_mike bruno_matt sidhu3 air wave practical workshop_mike bruno_matt sidhu
3 air wave practical workshop_mike bruno_matt sidhu
 
asdasdsadsadasdasdaddasdasdasdasdweqweqewqe
asdasdsadsadasdasdaddasdasdasdasdweqweqewqeasdasdsadsadasdasdaddasdasdasdasdweqweqewqe
asdasdsadsadasdasdaddasdasdasdasdweqweqewqe
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformadoDesafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
 
2012 ah emea deploying byod
2012 ah emea   deploying byod2012 ah emea   deploying byod
2012 ah emea deploying byod
 
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
Cyxtera - Operational Complexity: The Biggest Security Threat to Your AWS Env...
 
2012 ah apj keynote - technology update
2012 ah apj   keynote - technology update2012 ah apj   keynote - technology update
2012 ah apj keynote - technology update
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Real-world 802.1X Deployment Challenges
Real-world 802.1X Deployment ChallengesReal-world 802.1X Deployment Challenges
Real-world 802.1X Deployment Challenges
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 
2012 ah vegas wlan security fundamentals
2012 ah vegas   wlan security fundamentals2012 ah vegas   wlan security fundamentals
2012 ah vegas wlan security fundamentals
 
Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security Unidirectional Security, Andrew Ginter of Waterfall Security
Unidirectional Security, Andrew Ginter of Waterfall Security
 

More from Aruba, a Hewlett Packard Enterprise company

Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Aruba, a Hewlett Packard Enterprise company
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Aruba, a Hewlett Packard Enterprise company
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
Aruba, a Hewlett Packard Enterprise company
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
Aruba, a Hewlett Packard Enterprise company
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
Aruba, a Hewlett Packard Enterprise company
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
Aruba, a Hewlett Packard Enterprise company
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
Aruba, a Hewlett Packard Enterprise company
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
Aruba, a Hewlett Packard Enterprise company
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
Aruba, a Hewlett Packard Enterprise company
 

More from Aruba, a Hewlett Packard Enterprise company (20)

Airheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba CentralAirheads Tech Talks: Cloud Guest SSID on Aruba Central
Airheads Tech Talks: Cloud Guest SSID on Aruba Central
 
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard AgentsAirheads Tech Talks: Understanding ClearPass OnGuard Agents
Airheads Tech Talks: Understanding ClearPass OnGuard Agents
 
Airheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.xAirheads Tech Talks: Advanced Clustering in AOS 8.x
Airheads Tech Talks: Advanced Clustering in AOS 8.x
 
EMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba CentralEMEA Airheads_ Advance Aruba Central
EMEA Airheads_ Advance Aruba Central
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
EMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS SwitchEMEA Airheads- Switch stacking_ ArubaOS Switch
EMEA Airheads- Switch stacking_ ArubaOS Switch
 
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS SwitchEMEA Airheads- LACP and distributed LACP – ArubaOS Switch
EMEA Airheads- LACP and distributed LACP – ArubaOS Switch
 
Introduction to AirWave 10
Introduction to AirWave 10Introduction to AirWave 10
Introduction to AirWave 10
 
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS SwitchEMEA Airheads- Virtual Switching Framework- Aruba OS Switch
EMEA Airheads- Virtual Switching Framework- Aruba OS Switch
 
EMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant APEMEA Airheads- Aruba Central with Instant AP
EMEA Airheads- Aruba Central with Instant AP
 
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.xEMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
EMEA Airheads- AirGroup profiling changes across 8.1 & 8.2 – ArubaOS 8.x
 
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
EMEA Airheads-  Getting Started with the ClearPass REST API – CPPMEMEA Airheads-  Getting Started with the ClearPass REST API – CPPM
EMEA Airheads- Getting Started with the ClearPass REST API – CPPM
 
EMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP DeploymentEMEA Airheads - AP Discovery Logic and AP Deployment
EMEA Airheads - AP Discovery Logic and AP Deployment
 
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.xEMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
EMEA Airheads- Layer-3 Redundancy for Mobility Master - ArubaOS 8.x
 
EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)EMEA Airheads- Manage Devices at Branch Office (BOC)
EMEA Airheads- Manage Devices at Branch Office (BOC)
 
EMEA Airheads - What does AirMatch do differently?v2
 EMEA Airheads - What does AirMatch do differently?v2 EMEA Airheads - What does AirMatch do differently?v2
EMEA Airheads - What does AirMatch do differently?v2
 
Airheads Meetups: 8400 Presentation
Airheads Meetups: 8400 PresentationAirheads Meetups: 8400 Presentation
Airheads Meetups: 8400 Presentation
 
Airheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau PresentationAirheads Meetups: Ekahau Presentation
Airheads Meetups: Ekahau Presentation
 
Airheads Meetups- High density WLAN
Airheads Meetups- High density WLANAirheads Meetups- High density WLAN
Airheads Meetups- High density WLAN
 
Airheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes ArubaAirheads Meetups- Avans Hogeschool goes Aruba
Airheads Meetups- Avans Hogeschool goes Aruba
 

Recently uploaded

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 

Recently uploaded (20)

De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 

Security advanced rich langston_jon green

  • 1. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 1 #airheadsconf#airheadsconf Advanced Security: Protecting Your Network End-to-End with Aruba Networks Personalized Security Rich Langston Jon Green
  • 2. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 2 #airheadsconf •  Traditional Network Security Model Is No Longer Effective •  Personalized, Context Aware Security is the Answer •  Components of Personalized Security •  Implementing Personalized Security Network- wide with Aruba Networks Agenda
  • 3. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 3 #airheadsconf Challenge of Security in the Enterprise Security works toward: •  Reduce the likelihood of an information security breach •  Reduce the impact of any breach or malware outbreak •  Create an audit trail to ensure policy compliance •  Increase the reliability of your network But, we also need to: •  Ensure enterprise-critical apps are always available •  Keep everyone productive •  Allow guests on our network •  Support remote workers just like they are in the office
  • 4. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 4 #airheadsconf Traditional Model Barely Worked Enterprise Perimeter Employees WAN Branch Office Branch Employees Home Offices Internet Data Center Visitors Contractors Enterprise Perimeter
  • 5. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 5 #airheadsconf Over Time, More Holes Appeared Enterprise Perimeter Employees WAN Branch Office Branch Employees Home Offices Internet Data Center Visitors Contractors Enterprise Perimeter Road Warriors Partner Sites
  • 6. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 6 #airheadsconf BYOD and Mobility Break It Enterprise Perimeter Employees BYOD WAN Branch Office Branch Employees Home Offices Internet Data Center Visitors Contractors Enterprise Perimeter
  • 7. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 7 #airheadsconf Personalized, Context Aware Security is The Answer Data Center Peter JuliaPartners Branch Employees Ash Rich Scott Dave Sujatha Contractors Visitors Grace
  • 8. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 8 #airheadsconf Personalized Security Solves Our Problems   Reduce the likelihood of an information security breach   Reduce the impact of any breach or malware outbreak   Create an audit trail to ensure policy compliance   Increase the reliability of your network   Ensure enterprise-critical apps are always available   Keep everyone productive   Allow guests on our network   Support remote workers just like they are in the office
  • 9. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 9 #airheadsconf#airheadsconf9 Prerequisites for Personalized Security
  • 10. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 10 #airheadsconf Prerequisites for Personalized Security 1101010001001111100 Identify the Device and User Classify the Traffic Control Optimize the Experience Follow the UserAccess Secure the Connection Across All Access Methods Instant AP Mobility Access Switch Mobility Controller VPN
  • 11. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 11 #airheadsconf Prerequisites for Personalized Security 1101010001001111100 Identify the Device and User Classify the Traffic Control Optimize the Experience Follow the UserAccess Secure the Connection At All Locations HQ Branch SOHO Road Warrior
  • 12. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 12 #airheadsconf With a Single, Universal policy Any DeviceAny User Employee Contractor Visitor PatientShopper Any App   Posture   BYOD   Corporate   Time of Day   External Data Any Data
  • 13. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 13 #airheadsconf Typical Aruba Network
  • 14. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 14 #airheadsconf Security Architecture Roles ClearPass Policy Manager Mobility Access Switch Controller • Policy  Decision  Point  for  wired  and  wireless   • Authen5ca5on  Server   • Cer5ficate  Authority  for  BYOD   • PDP  in  non-­‐CP  environments   • Policy  Enforcement  Point     • Policy  Enforcement  Points   Branch Office Instant RAP
  • 15. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 15 #airheadsconf AirWave – Complete Network Insight •  Controller sends all events to Airwave •  User authentications •  Wireless Intrusion events •  All application data •  Account for network activity by user, time, date, location •  Who used what applications? When? •  Which applications are taking all my bandwidth? •  Requires AirWave 7.7 or later •  Ensure PCI compliance with built-in reports •  Forensic information for network outage reports
  • 16. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 16 #airheadsconf#airheadsconf16 Personalized Security Step-By-Step
  • 17. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 17 #airheadsconf#airheadsconf17 Universal Encryption Secure the Connection
  • 18. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 18 #airheadsconf WPA2 Enterprise - Strong Over Air Encryption •  Combines strong encryption, including AES-CCMP, with mutual authentication •  Ensures users do not connect to an imposter AP •  Protects the data to the level that the Federal Information Processing Standard requires •  Not subject to the brute force attacks used against weak WPA2 PSK passphrases •  More secure than an open Ethernet port WPA2 Handshake
  • 19. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 19 #airheadsconf •  Short answer: Yes – because of things like rainbow tables, distributed cracking, fast GPUs, etc. •  This is why we use MSCHAPv2 inside a TLS tunnel for Wi-Fi •  Still using PPTP for VPN? Watch out… Isn’t MSCHAPv2 broken?
  • 20. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 20 #airheadsconf Centralized encryption increases security Employee Authentication AuthorizationIdentification Malicious Insider Traditional Distributed Encrytion DisconnectAruba Centralized Encryption
  • 21. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 21 #airheadsconf Mobility Controller ClearPass Policy Manager Branch Office Instant Encryption Extends Everywhere AirWave Management Platform Tu Local MAS LAN Switch Internet LAN Core Remote Office MAS Switch RAP Phone, Laptop, Tablet •  IPSec encryption protects all edge traffic •  Full IKEv2 Support •  Regardless of access method •  VIA •  RAP •  Remote MAS •  Instant •  Local MAS •  Eliminates eavesdropping on the wire IPSec IPSec IPSec IPSec IPSec or GRE
  • 22. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 22 #airheadsconf Aruba VIA Client   Mobile device policy compliance •  End-to-end authenticated and encrypted session to controller •  Automatically detects trusted/untrusted network; establishes connected when needed   Supported devices •  Windows (32/64 bit) •  Apple iOS •  Mac OSX •  Android 4.x •  Linux (April 2013)   Seamless Mobility •  Firewall policies tied to user role •  Same policy as in campus, branch   Best in Class Security •  Supports NSA-approved Suite B cryptography •  IPsec VPN with SSL fallback
  • 23. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 23 #airheadsconf#airheadsconf23 Authenticate Everything
  • 24. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 24 #airheadsconf •  Use Mutual Authentication whenever possible •  Network proves its identity to the client •  Client Proves its identity to the network •  Whenever possible, use single sign on (SSO) strategies •  Not only across network types, but also enterprise apps •  Typically, link LDAP or Active Directory to all enterprise access •  Multiple options for securing identity •  AD Credentials, User based certificates, machine certifications, Multifactor Authentication •  Options for multiple identity stores Strong Authentication of User and Device
  • 25. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 25 #airheadsconf Universal Authentication for Wired, Wireless, and Remote Users Mobility Access SwitchController •  WPA2-Enterprise for wireless security – Includes 802.1X for strong authentication •  Multiple Methods for Wired Authentication – 802.1X – MAC – User Derived Roles
  • 26. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 26 #airheadsconf EAP to RADIUS Server EAPOL (EAP over LAN) RADIUS EAP Session ClearPass PM AP/Controller STA
  • 27. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 27 #airheadsconf Local EAP Termination EAPOL (EAP over LAN) RADIUS/LDAP (optional) EAP Session Authentication Server AP/Controller STA
  • 28. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 28 #airheadsconf •  Strong authentication of user yields their identity and their role •  Strong authentication of the device yields its risk profile •  Allows fine grain assignment of roles and a highly personalized experience Extended Identity is Key to Personal Security Employee Rich Product Management BYOD iPAD Employee Rich Product Management Corp. MacBook + + + +!=
  • 29. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 29 #airheadsconf How do we assign these roles? •  Controller •  Default Roles can be assigned •  Roles can be derived using a few basic traits •  ClearPass •  Roles can be assigned based on the authenticating user and device •  ClearPass profiling •  ClearPass can fingerprint the device using a variety of traits •  This can trigger an onboarding event for quicker, safer authentication next time
  • 30. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 30 #airheadsconf Role Derivation Default Roles • Configurable by authentication method • SSID User Rules • Device-specific attributes • Encryption type • AP used (by name or BSSID) Server Derived Roles • Role assignment based on attributes from ClearPass server • Different access privileges based on security policy • Can use single SSID for all users/ devices • ClearPass advanced profiling • Policy compliance • Real Time event driven
  • 31. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 31 #airheadsconf What Does ClearPass Profile? ClearPass Profiling Smart Devices Laptops/ Desktops Network/ Non Login Devices
  • 32. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 32 #airheadsconf 1. Device type automatically detected & redirected to portal 2. Settings & credentials are auto-configured after user enters domain credentials 3. User automatically placed on proper SSID & network segment ClearPass Device Onboarding
  • 33. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 33 #airheadsconf Granular BYOD Onboarding Controls
  • 34. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 34 #airheadsconf How Can I Use This Information? Device enters network Placed directly into restricted role Placed in onboarding role, complete onboarding process Typically, assign very low privilege role. Perhaps a remediation role Typically, assign to higher access role Corp. device directly placed in correct role Typically, full access to their needed resources Profile device Problem Compliant, Successful Compliant Non-Compliant
  • 35. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 35 #airheadsconf How do I safely give Guests Network access Controller-based Guest Access –  Customizable welcome page –  Flexible authentication options ClearPass based Guest Access –  Highly customizable –  Advertising options –  Self registration –  Sponsored registration –  Preregistration Aruba Company Confidental 35
  • 36. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 36 #airheadsconf Access Network 1. Sponsor creates guest credentials ClearPass Policy Manager 2. Account enabled, visitor notified VIA screen, SMS, or email 3. User logs in when they arrive New Guest Sponsor Example: Sponsor Registration
  • 37. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 37 #airheadsconf#airheadsconf37 Control Access
  • 38. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 38 #airheadsconf Typical Roles Guest Contractor Doctor Students Faculty Employee Employee – BYOD Corporate Mobile Device Unified Communications Infrastructure Aruba Company Confidental 38
  • 39. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 39 #airheadsconf Multiple classes of users on same infrastructure easily separated AAA Services RADIUS, LDAP, AD Security Services Anti-Virus, IPS, URL Filtering Access On-Ramps Access Point SSID: Corp Access Point SSID: GUEST S2500/3500 Wired Ports Mobility Controller QoSFW QoSFW QoSFW QoSFW QoSFWGuest Mobile Device VoIP Device Contractor Employee Role-Based Security Role-based Access Control
  • 40. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 40 #airheadsconf Why Worry About Authorization? Where is the “network perimeter” today?   Mobility brings us:   Disappearance of physical security   New mobile users, devices appearing everyday   Increased exposure to malware   Assuming that “the bad guys are outside the firewall, the good guys are inside” is a recipe for disaster We meet again, Agent 99!
  • 41. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 41 #airheadsconf VLAN-Based Security Can’t Scale MAC, IP – User Mapping User – VLAN Mapping VLAN – Policy Mapping •  User identity is based on MAC or IP address (weak identities – like a boarding pass) •  Maintaining VLAN/Role mappings across a large network is very difficult •  User identity can be spoofed which means ACL can be violated
  • 42. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 42 #airheadsconf Session Processing –  Identity-based firewall policies –  MAC Address – IP Address – VLAN – User Name – User Role – Firewall Policies binding –  Traffic Management Protocol Processing –  ALG for SIP, RTSP, FTP, TFTP, SCCP, Vocera, ICMP –  Intrusion/DoS Detection and Prevention –  Detects SYN, ping, ports scan attacks –  Can prevent continued attacks (black list station) –  Enforces TCP handshakes, prevents replay attacks Station Blacklisting –  Authentication Failure –  Firewall Rule Violation –  TCP Attacks ICSA Certified Aruba Policy Enforcement Firewall Context Aware, Identity Based
  • 43. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 43 #airheadsconf AppRF Application Monitoring and Control •  New “Firewall” Dashboard UI •  Includes summary views of activity by Users, Devices, Destinations, Applications, WLANs, Roles •  Allows drilling down into details of each
  • 44. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 44 #airheadsconf Real-Time Application Control •  Dynamic web-application prioritization •  Use roles to limit or QoS applications •  Real Time ACLs updated whenever user tries to use app •  ACLs can block, QoS, log, mirror traffic, pause scanning •  No impact on throughput Soon: •  Config stubs for common web-based applications Detect Application Create ACL Assign To Roll User triggers update Traffic blocked/ QoS adjusted
  • 45. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 45 #airheadsconf Built in CA for BYOD Device Access Revocation Revoke Device Network Access Device Inventory Data Built in CA
  • 46. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 46 #airheadsconf What about compromised devices? In order to maintain the reliability of your network, it’s important to maintain the security health of your clients –  Software updates –  Security patches –  Active and current antivirus Aruba Company Confidental 46
  • 47. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 47 #airheadsconf Detect unsecure devices Block access to network resources across wired, wireless & remote Auto-Remediate the device Minimizes Risk to Network Access Network ClearPass Policy Manager with OnGuard OnGuard - Control Compromised Devices
  • 48. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 48 #airheadsconf • All Windows Versions • A/V, A/S, FW, registry keys, services, patch Mgmt, processes, peer-to-peer apps, USB storage devices, Hot Fixes, Hotspots & VMs • Red Hat, CentOS, Fedora, SUSE • Status of services, anti-virus and firewall • Mac OS X • Status of anti-virus, anti-spyware and firewall •  Persistent and Dissolvable Agents for laptops/desktops Supported Endpoint Computers
  • 49. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 49 #airheadsconf#airheadsconf49 Optimize the Experience
  • 50. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 50 #airheadsconf Personalization and Control Required for Optimal Network Experience •  Even as WLAN gets faster, there are new demands on networks •  Higher Device Density •  Higher Bandwidth Apps •  Complete reliance on wireless networks •  Therefore, the air is a commodity that must be policed to ensure productivity X mb/sec Ymb/sec
  • 51. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 51 #airheadsconf Deep Network Awareness is Essential •  Application awareness allows optimization of networking stack –  Use higher level information to add value at lower levels •  Blocking inappropriate applications from wasting the air •  Layer 1 adjustments –  Pause radio scanning for critical apps •  Layer 2 adjustments –  Fine grain QoS marking by User and APP to prioritize use of the air •  Multicast and Broadcast Control Layer 1 Layer 2 Layer 3 Layer 4 Layer 5 Layer 6 Layer 7
  • 52. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 52 #airheadsconf#airheadsconf52 Policy Must Follow User
  • 53. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 53 #airheadsconf Remember Universal Policy? Any DeviceAny User Employee Contractor Visitor PatientShopper Any App   Posture   BYOD   Corporate   Time of Day   External Data Any DataClearPass Policy Manager
  • 54. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 54 #airheadsconf •  Identity Stores – LDAP, Active Directory •  Controller – mDNS, HTTP Agent Strings, DHCP requests •  Active Profiling – SNMP, Nessus •  Passive Profiling •  Agent information – Microsoft NAP, OnGuard •  Time of Day •  Location •  Mobile Device Management Systems ClearPass Context Sources
  • 55. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 55 #airheadsconf ClearPass ClearPass Policy Manager Orchestrates Policies for all Users and Devices Mobility Controller Mobility Access Switch Policy EnforcementPolicy Definition *New in AOS 7.2 Branch Office Instant Assign Preinstalled Role Dynamically Download Role Dynamically Download Role Policy Audit
  • 56. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 56 #airheadsconf Application and Data Control Features Controller AirWave ClearPass Basic Device ID ✔ Role based app enforcement ✔ Real Time visualization ✔ Guest Portal ✔ Historical visualization and trending ✔ Fault Identification ✔ Network Wide Policy Enforcement ✔ Advanced Device ID ✔ Dynamic Role Provisioning ✔ Endpoint Policy Enforcement ✔ Advanced Guest Portal ✔ BYOD Device Onboarding ✔
  • 57. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 57 #airheadsconf • Complex • Costly • Brittle • High Maintenance Applications Management Supply Chain Mgmt Smart Grid CRM HR ERP CMDB SIEM Asset Mgmt IPAM Infrastructure Network Security DNS, DHCP AAA Switches Routers Building Controls Factory Controls Network Location SNMP, Syslog, Netflow Custom Integration – API’s, Scripts Current Information Sharing Approaches
  • 58. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 58 #airheadsconf IF-MAP Server Applications Management Supply Chain Mgmt Smart Grid CRM HR ERP CMDB SIEM Asset Mgmt IPAM Infrastructure Network Security DNS, DHCP AAA Switches Routers Building Controls Factory Controls Network Location IF-MAP Protocol (Publish, Subscribe, Search) Automatically aggregates, correlates, and distributes data to and from different systems, in real time IF-MAP: Future of Information Sharing and Real-Time Policy
  • 59. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 59 #airheadsconf 11- RADIUS updates firewall policy to block access12- PDP publishes the update to the MAP1- User (John) enters zone 12- Hirsch system publishes to the MAP server3- User requests for access to the network4- PDP publishes to the MAP server5- PDP Subscribes to the MAP server6- PDP grants access to the UNCLASS network7- User connects to the classified network8- User leaves Zone 1, while still logged in Subscription Update: John in Zone 2 9- Card reader publishes the update to the MAP10- MAP updates PDP about the location change Use Case – Integrated Network / Physical Security Solution Infoblox MAP Server Hirsch System (Physical Sensor) Publish: John in Zone 1 Publish: John is Authenticated; Session ID 113:3 Subscribe: Changes to Session 113:3 identity = John location = Zone 1 Access- request = 113:3 Secure Zone 1 Classified Network Publish: John in Zone 2 location = Zone 2 Publish (delete): John is Authenticated Access Request Grants Access Request Zone 2 MAP Database authenticated Policy Violation: Access Cut Off CHANGE?CHANGE! Aruba Controller ClearPass Policy Manager (RADIUS)
  • 60. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 60 #airheadsconf •  Personalized security and user experience is essential to meeting today’s information security challenges •  These personalized policies must be enforced at every network touch point in a consistent manner to be effective •  Using an Aruba Networks infrastructure, the process of implementing personalized security is dramatically simplified •  Aruba’s vision for the future of networking extends this vision even further Summary
  • 61. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 61 #airheadsconf#airheadsconf Thank You - Questions?
  • 62. CONFIDENTIAL © Copyright 2013. Aruba Networks, Inc. All rights reserved 62 #airheadsconf#airheadsconf62