protecting your network with network admission control design and policy implications

15
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public Presentation_I D 1 Justin Rowling – Systems Engineer Protecting your network with Network Admission Control Design and Policy implications

Upload: meara

Post on 07-Jan-2016

24 views

Category:

Documents


0 download

DESCRIPTION

Protecting your network with Network Admission Control Design and Policy implications. Justin Rowling – Systems Engineer. What is NAC ?. Gives differentiated access to the network based on Who you are (staff, student, visitor etc) What you have (Platform/OS, patch level, AV status etc). - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 1

Justin Rowling – Systems Engineer

Protecting your network withNetwork Admission Control

Design and Policy implications

Page 2: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 2

What is NAC ?

Gives differentiated access to the network based on

– Who you are (staff, student, visitor etc)

– What you have (Platform/OS, patch level, AV status etc)

Page 3: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 3

Why do you want NAC

Major threat is still malware on Windows 2K upwards

Primary motivation is fear or ‘mass outbreak’

Also reducing helpdesk/support workload

Also makes ports/SSIDs ‘dynamic’

– access/acl’s vary by user/group

Page 4: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 4

NAC on Wireless LANs

WLAN users are more likely to

– Have been off the network for periods of time

– Have been on another network

– Be non-standard

– Be new (to you)

– Need an authentication system*

All of these increase the risks and/or support overhead

Page 5: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 5

Key Requirements of NAC Solution

Securely identify users

Enforce policy specific to type of users

Quarantine and Remediate

Be easy to set up and keep up to date

Play nicely with network operating systems

Page 6: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 6

Securely identify users

Check username and password directly or

Trust some other authentication like 802.1x, Windows domain, VPN concentrator etc

Should use existing directory structure LDAP, Radius etc

Use this information to get group/role of usere.g staff, student, contractor etc.

Page 7: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 7

Enforce policy specific to type of users

Staff – policy might be very prescriptive:

– specify the allowed types of OS, one AV agent, required software etc, but then allow unrestricted access

Students – policy may be more flexible

– allow any AV, any OS, but restrict access to finance and admin networks

Guests – policy may be light touch

– may warn about OS health (patch levels) but not enforce, and allow access to anything but local IP addresses

Page 8: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 8

Quarantine and Remediate

“as we know, there are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns -- the ones we don't know we don't know.”

Donald Rumsfeld

Page 9: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 9

Quarantine and Remediate

Protect the network from unknown users

Protect unknown users from each other

Give users who do not comply with policy enough access to self help

Guide these users through the steps they have to take

Take steps to prevent abuse

Page 10: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 10

Be easy to set up and keep up to date

Ideally turn written policy in to NAC configuration in easy steps

If the system is not kept up to date its value diminishes

If remediation is not straightforward users are more likely to phone/queue up at help-desk

Page 11: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 11

Play nicely with Network OS

NAC solutions may restrict or change network access during boot up and log on process

Boot scripts, network drives, Group Policy objects may suffer

It’s important to understand what the impact of a NAC deployment would be, and work around or fix these issues

Page 12: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 12

Dynamic VLANs

Post assessment control delegated to VLAN

–VLAN dictates IP network

–ACLs from that network to others control access

–Make sure you test your DHCP regime

VLANs do not need to be global*

E.g. in building 1 vlan named ‘staff’ is vlan10

In building 2 vlan named ‘staff’ is vlan 110

Need Mechanism to detect change of host

Link down, client keep alive etc

Page 13: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 13

Side benefits of NAC

Can also be used to check for required/undesirable s/w

Generates a wealth of information about clients

Can make ports/networks multi-use

Can present an AUP for regular acceptance

Page 14: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 14

Summary

NAC tailors network access to different user types

NAC enforces your policy (good or bad)

NAC can update/reconfigure users who don’t comply

NAC can reduce your exposure to ‘mass outbreaks’

NAC need to work with network OS for prime-time

Page 15: Protecting your network with Network Admission Control Design and Policy implications

© 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Presentation_ID 15