enabling authentication & network admission control

13
Enabling Authentication & Network Admission Control Steve Pettit

Upload: yadid

Post on 01-Feb-2016

38 views

Category:

Documents


0 download

DESCRIPTION

Enabling Authentication & Network Admission Control. Steve Pettit. Great Bay Software Inc. Value Statements Provide the critical first step towards NAC/802.1X Dramatically shorten the deployment time for NAC and network-based authentication Provide Trusted Access to non-NAC endpoints - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Enabling Authentication &  Network Admission Control

Enabling Authentication & Network Admission Control

Steve Pettit

Page 2: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Great Bay Software Inc.

Value Statements Provide the critical first step towards NAC/802.1X Dramatically shorten the deployment time for NAC and network-based authentication Provide Trusted Access to non-NAC endpoints Provide data for all network attached endpoints including:

• Real-time Location and Identity• Historical Addressing, Identity, and Location• Contextual views of all Enterprise owned assets

Impact St. John’s Hospital reduced 156 man-weeks of discovery

and documentation work into 2 man weeks

Page 3: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Identifying the problem space

The Enterprise LAN is comprised of a myriad of endpoint types– Windows typically comprises approximately

50% of wired endpoints– Most Enterprise endpoints are undocumented– DHCP has enabled endpoints to be added

over time without IT involvement– Any Access/Admission Control system

requires this information– Where WLAN is typically 30:1, Wired LAN is

1:3.5

Goal: To generate a contextual inventory of all endpoints

Page 4: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Endpoint Profiling

Understanding that not all network endpoints can authenticate… All network endpoints must be Profiled and Located prior to deployment The goal is to enable secure network access for non-authenticating devices

NAC Non-NAC

UPS Phone Printer

Page 5: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Sample non-NAC Aliases

Printers Fax Machines ISLs IP Phones Wireless Access Points Managed UPS Hubs MultiCast video displays Kiosks Medical imaging machines Video Conferencing stations HVAC Cash Registers

Turnstiles Time Clocks Vending Machines Parking Gates Doors Firewalls Proxy Refrigerators IP Cameras Servers UNIX stations Alarm Systems RMON Probes

Page 6: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Applications for Endpoint Profiling

Authentication of non-authenticating hosts Network configuration for static access provisioning Monitoring of non-authenticating devices for behavior Addressing audit findings “do you know what is plugged into

your network” Provide data for all network attached endpoints including:

• Real-time Location and Identity• Historical Addressing, Identity, and Location• Contextual views of all Enterprise owned assets

Page 7: Enabling Authentication &  Network Admission Control

Endpoint Profiling

The NAC Management lifecycle

Discover all endpoints by type and location

Model the topology Provision

appropriate settings at the system level

Liaise with AAA systems for authentication

Provide real-time & historical Identity and Location tracking

Enable adds, moves, and changes

Dead ended Ports

Provide contextual information to security and events management systems

Monitor and Manage events & anomalies related to authentication

• Shadow Hosts• Port Swapping• Profile Changing• MAC spoofing

Deployment Change Control Events Management

Page 8: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Endpoint Discovery and Mapping

Profile creation - network traffic analysis– Port Mirror or Tap visibility into aggregate

network traffic - L2-7 rule sets• L2 - MAC - MAC vendor• L3 - IP / IP range / TTL fingerprint• L4 port & port ranges• L7 rules – User agent, email banner, DHCP

decode– Netflow Collection– Active Profiling– Boolean logic for complex rules

• GUI-based for AND• XML for AND, OR, NOT

– Inference-based Profiles• Manual or Auto-created via My Network

Page 9: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Deployment Models

None - - - - - Visibility Into Network Traffic - - - - - Full

Pas

sive

vs.

Act

ive

Pro

fili

ng

MAC VendorIP RangeStatic IP

Web User AgentWeb Server TypePrint ServicesWeb URLSMTP BannerL3 / L4 network

DHCP vendorDHCP OptionsTTL profilingDHCP ClientHost NameARP decode

Open L4 PortsWeb Server TypeUser Agent

NetFlow – L3/4 traffic

Page 10: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Use Cases for Beacon

Provide NAC for the other 50% of the Enterprise• Monitoring and authorization of Non-Windows devices

Enable the deployment of network-based authentication• Alleviate the manual discovery process• Compliment/liaise with the AAA system• EAP• MAC-auth• EAPoX

Provide Contextual information to aggregate systems:• MARS• IDS/IPS• Asset Systems

Page 11: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Integration Points with Cisco

NAC Framework• Manage NRH list• Port/VLAN admin• Liaise w ACS via LDAP• NAC for non-CTA endpoints

NAC Appliance• Manage NRH list• Provision MAC/Role• Port/VLAN admin• NAC for non-CCA endpoints

MARS• Contextual Event information•Historical ref.

Integration protocols:• Web API• LDAP• SNMP• Syslog• GAME (future)

Page 12: Enabling Authentication &  Network Admission Control

Endpoint Profiling

Summary

Reduces 156 man weeks of work to 2 weeks

Automated discovery and system-level provisioning

Ongoing monitoring of non-NAC endpoints

Flexible Deployment model

Page 13: Enabling Authentication &  Network Admission Control

Endpoint Profiling