Brian Dwyer – CITA370. Introduction  Network Device Security  Identity Management AAA Process Model ○ Authentication ○ Authorization ○ Accounting (Sometimes.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Chapter 7: Transport Layer
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking Assist. Prof.
HTTP Cookies. CPSC Application Layer 2 User-server state: cookies Many major Web sites use cookies Four components: 1) cookie header line of HTTP.
CMPE208 Presentation Terminal Access Controller Access Control System Plus (TACACS+) By MARVEL (Libing, Bhavana, Ramya, Maggie, Nitin)
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 3 – Authentication, Authorization and Accounting.
CLIENT / SERVER ARCHITECTURE AYRİS UYGUR & NİLÜFER ÇANGA.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
SSH : The Secure Shell By Rachana Maheswari CS265 Spring 2003.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Introduction to Network Programming and Client-Server Design.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
RADIUS Server PAP & CHAP Protocols. Computer Security  In computer security, AAA protocol commonly stands for authentication, authorization and accounting.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
Remote Networking Architectures
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
Chapter 17 TACACS+.
Privilege Levels Cisco IOS provides for 16 different privilege levels ranging from 0 to 15. Cisco IOS comes with 2 predefined user levels. User mode.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Networking Basics TCP/IP TRANSPORT and APPLICATION LAYER Version 3.0 Cisco Regional Networking Academy.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 5 City College.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
LIGHT WEIGHT DIRECTORY ACCESS PROTOCOL Presented by Chaithra H.T.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. IEEE 802.1x An internet standard created to perform authentication services for remote access to a central LAN. An internet standard.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Transport Layer Introduction to Networking.
Networking Basics Lesson 1 Introduction to Networks.
Presented by Xiaoyu Qin Virtualized Access Control & Firewall Virtualization.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part V: Monitoring Campus Networks.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Chapter 3: Authentication, Authorization, and Accounting
TFTP: Trivial file transfer protocol
RADIUS 2-Aug-2007.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir CCNP-SWITCHING Mohamed Samir YouTube channel Double.
AAA Services Authentication -Who ? -Management of the user’s identity Authorization -What can the user do? -Management of the granted services Accounting.
RADIUS Protocol Sowjanya Talasila Shilpa Pamidimukkala.
Configuring AAA Kamyar Miremadi Laila Sherif Summer 2005.
RADIUS What it is Remote Authentication Dial-In User Service
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—3-1 Lesson 3 Cisco PIX Firewall Technology and Features.
Netprog: Chat1 Chat Issues and Ideas for Service Design Refs: RFC 1459 (IRC)
Access Control Chapter 3 Part 4 Pages 227 to 241.
Cisco I Introduction to Networks Semester 1 Chapter 7 JEOPADY.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Remote Authentication Dial-In User Service (RADIUS)
Port Based Network Access Control
Basic Edge Core switch Training for Summit Communication.
Chapter 7: Transport Layer
Chapter 9: Transport Layer
Instructor Materials Chapter 9: Transport Layer
Module Overview Installing and Configuring a Network Policy Server
Information Security Professionals
Radius, LDAP, Radius used in Authenticating Users
IPSec VPN Chapter 13 of Malik.
Cisco Real Exam Dumps IT-Dumps
File Transfer Protocol
Chat Refs: RFC 1459 (IRC).
Ch. 7 Network Management CIS 187 Multilayer Switched Networks CCNP version 7 Rick Graziani Spring 2016.
Presentation transcript:

Brian Dwyer – CITA370

Introduction  Network Device Security  Identity Management AAA Process Model ○ Authentication ○ Authorization ○ Accounting (Sometimes referred to as auditing)  Terminal Access Controller Access Control System AAA Provider ○ Client-Server model

TACACS+ History  Has roots in DoD network Developed in 1980’s for DDN by MILNET  TACACS (RFC 1492)  Extended TACACS

TACACS+ Protocol Architecture  Uses TCP port 49 for communications Connection Oriented (Reliable) ○ (Older TACACS and Extended used UDP49)  Utilizes Encryption Only packet header transmitted plain-text  Supports Separate Databases and Database Replication  Cisco Proprietary*

 Each process is handled separately Three Types of TACACS+ Packets ○ TAC_PLUS_AUTHEN=0x01 ○ TAC_PLUS_AUTHOR=0x02 ○ TAC_PLUS_ACCT=0x03 Start, Reply, Continue, Accept, Reject, Error, Request, Response (Attribute-Values) TACACS+ Protocol

TACACS+ vs. RADIUS  TACACS+ is more secure RADIUS only encrypts passwords limited in length to 16 bytes  TACACS+ is more reliable (Utilizes TCP vs. UDP-based RADIUS)  TACACS+ is port efficient (TCP-49) Radius uses UDP 1645,1646,1812,1813  TACACS+ command authorization RADIUS does not support this.

TACACS+ Demonstration

Network Design – AAA Implications  Why do I need AAA? Regulation Compliance!!!  Why do I want AAA? Security, logging, ability to centralize when using AAA protocol  How to Implement AAA RADIUS for general user authentication TACACS+ for network administration functions Small businesses, just use local AAA services… RADIUS provides more complete accounting capabilities (Users) ○ RADIUS supports custom & OEM specific AV’s TACACS+ provides more secure, reliable communication between client and server. (Administration)