Ing. Peter Feciľak , KPI, FEI, TUKE.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

© 2006 Cisco Systems, Inc. All rights reserved. ICND v2.3—2-1 Extending Switched Networks with Virtual LANs Introducing VLAN Operations.
Securing the Router Chris Cunningham.
/30 Host Name : R1 Serial 0/0/0.1.2 Host Name : R2 Router Lab 3 : 2 - Routers Connection DTE DCE.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Implement VTP LAN Switching and Wireless – Chapter 4.
Implementing Layer 3 High Availability
© 2009 Cisco Systems, Inc. All rights reserved. SWITCH v1.0—6-1 Implementing Layer 3 High Availability Configuring Layer 3 Redundancy with HSRP.
Understanding Layer 3 Redundancy. © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 2 Upon completing this lesson, you will be able.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Networking with Windows Vista.. Vista’s New Tools and Features The Network and Sharing Center Network Discovery Network Map Network Diagnostics.
Using RADIUS Within the Framework of the School Environment Charles Bolen Systems Engineer December 6, 2011.
Mobile Computing and Security Authenticated Network Access (ANA) Jon Peters Associate Director Dave Packham Manager of Network Engineering NetCom University.
Wireless Security with 802.1X Copyright 2005 Michael Griego This work is the intellectual property of the author. Permission is granted for this material.
802.1x Port Authentication via RADIUS By Oswaldo Perdomo cs580 Network Security.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
© UNIVERSITY of NEW HAMPSHIRE INTEROPERABILITY LABORATORY UNH InterOperability Laboratory Bridge Functions Consortium 802.1X Port-Based Network Access.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Wireless Security and Accounting with 802.1X. Introduction Background Why 802.1X? What is 802.1X? Implementing 802.1X at UTD The future of 802.1X and.
PKI Network Authentication Dartmouth Applications Robert Brentrup Educause/Dartmouth PKI Summit July 27, 2005.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
The Operator Neutral Access At KistaIP. KistaIP ? Is a student dorm with 144 apartments.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Enterprise Network Security Accessing the WAN – Chapter 4.
EID Cards and “Identity Based Networking Services” Because “Networks” are an integral part of the total solution. Walter Gillis Account Manager, for Flemish.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Wireless technologies LAN Switching and Wireless – Chapter 7 and Fundamentals.
Remote Desktop Services Remote Desktop Connection Remote Desktop Protocol Remote Assistance Remote Server Administration T0ols.
HSRP Redundancy & Failover:
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Implementing Network Access Protection
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Network Security Principles & Practices
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
A Practical Guide for Joining EduRoam EuroCAMP Torino A Practical Guide for Joining EduRoam 4 March 2005 Version 1.6.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Module 8: Configuring Network Access Protection
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 LAN Design LAN Switching and Wireless – Chapter 1.
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
© 2015 Mohamed Samir YouTube channel All rights reserved. Samir Part V: Monitoring Campus Networks.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Chapter 3: Authentication, Authorization, and Accounting
1 © 2004 Cisco Systems, Inc. All rights reserved. Emarin Terena IBNS Identity Based Networking Terena Rhodes, June 04 Eric Marin EMEA Consulting Engineer.
Switching Topic 2 VLANs.
Workshop roaming services: eduroam / govroam
Network Security Principles & Practices By Saadat Malik Cisco Press 2003.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 VLANs LAN Switching and Wireless – Chapter 3.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Port Based Network Access Control
Implementing Network-Edge Security with 802.1x
Gateway redundancy protocols
Layer 3 Redundancy 1. Hot Standby Router Protocol (HSRP)
Microsoft Windows NT 4.0 Authentication Protocols
Instructor & Todd Lammle
Switch Setup Connectivity to Other locations Via MPLS/LL etc
On and Off Premise Secure Access
Cisco networking CNET-448
Chapter 10: Advanced Cisco Adaptive Security Appliance
Chapter 4: EtherChannel and HSRP
Presentation transcript:

Ing. Peter Feciľak Peter.Fecilak@tuke.sk 29.04.2008, KPI, FEI, TUKE. 802.1x Best Practises Ing. Peter Feciľak Peter.Fecilak@tuke.sk 29.04.2008, KPI, FEI, TUKE.

Content of the presentation Basic terminology - 802.1x - RADIUS server - Dynamic VLAN membership Why to implement 802.1x ? Problems in 802.1x implementation Discussion...

What is 802.1x ? IEEE standard for port-based Network Access Control Provides port-based authentication Supported in wired/wireless environment

802.1x terminology

Radius authentication server Provides authentication and other AAA services for end-device by a number of authentication mechanisms Each authentication mechanism has its own level of security (EAP/MD5, EAP/LEAP, EAP/PEAP) Can be linked to external user/computer database – ActiveDirectory / LDAP / MYSQL

Radius authentication server Supports delegation of requests (e.g. eduroam) Runs on different platforms MS Windows: Cisco Secure Access Control Server Linux: Freeradius / old version of CS ACS

Authenticator – access layer Provides port-based authentication and dynamic VLAN membership via RADIUS server (EAP and Radius protocol) Three types of VLANs: Dynamic VLAN from RADIUS AUTH-FAIL VLAN GUEST-VLAN Catalyst switches supports periodical re-authentication (Steve Riley vulnerability from 2005)

802.1x Supplicant Application that provides authentication via EAP against authenticator Possible types of authentication: Computer (domain account) User (domain account, OTP…) Computer with user account

802.1x Supplicant Supported under Windows and Linux as well Linux authentication tools: Xsupplicant (wired) WPA_supplicant (wireless) open1x

802.1x Linux Supplicant fecilak@travelko:~$ cat /etc/xsupplicant/xsupplicant.conf default_interface = eth0 default { type = wired allow_types = eap-peap identity = "pfecilak" eap-peap { inner_id = "pfecilak" root_cert = NONE chunk_size = 1398 random_file = /dev/urandom allow_types = all session_resume = yes eap-mschapv2 { username = "pfecilak" password = “Moje1Tajne2Heslo3!#" }

802.1x Windows Supplicant Native 802.1x supplicant under: MS Windows XP MS Vista MS Windows 2000 (latest SP) External supplicants: Cisco Secure Services Agent

802.1x Windows Supplicant

802.1x Windows Supplicant User-authentication GUI agent:

Why to implement 802.1x ? Provide port-based control for accessing network resources (problems with controlling physical access) Identify regular network users. Provide them easy access to network resources. Isolate non-regular users from internal infrastructure.

Why to implement 802.1x ? Apply different security levels for specified communities of users. Provide mobility features via RADIUS and Dynamic VLAN membership

Number of Security Levels Identify User/Computer roles and grand them access to network resources as defined by their security level.

Problems in 802.1x implementation Devices that does not support 802.1x connected to access-layer causes problems (e.g. hubs/unmanagable switches) Computers connected via IP phones that doesn’t support 802.1x has problem with authentication Periodical re-authentication can cause problems in large domain

Problems in 802.1x implementation Computer authentication with User to VLAN mapping can cause problem during IP settings renewal process Authentication tab not shown in local area network configuration (needs Wireless Zero Configuration)

Best practises When 802.1x is used mainly in MS Windows domain, use Cisco Secure ACS and computer domain accounts Do not use dynamic VLAN membership with User to VLAN mapping. Better is computer authentication with domain account

Best practises Scale the number of RADIUS servers concerning whether re-authentication is enabled and the number of end clients that will use 802.1x authentication I recommend to use 1 server for 100 computers when re-authentication at every 5 minutes is used

Best practises Classification to profiles for providing different security-levels: User Network For regular users granting access to network resources Visitors Network For guest access from internal infrastructure granting only internet access Guest/Auth-fail VLAN Fully isolated network. No network resources can be accessed.

Discussion/Questions and Answers

Redundant topologies

Redundant topologies

Problem

Solution – redundant gateways 192.168.1.2 192.168.1.1 192.168.1.0/24

Solution – HSRP MASTER 192.168.1.3 Slave SLAVE Master 192.168.1.3 Mas GW-1-1 GW-1-2 Virtual Router 192.168.1.2 192.168.1.1 192.168.1.3 Master Slave 192.168.1.2 192.168.1.1 192.168.1.0/24

First Hop Redundancy Protocols HSRP VRRP GLBP

Example - HSRP 192.168.1.2 192.168.1.1 GW-1-1(config)# interface FastEthernet 0/0 GW-1-1(config-if)# ip address 192.168.1.2 255.255.255.0 GW-1-1(config-if)# standby 1 priority 80 GW-1-1(config-if)# standby 1 preempt GW-1-1(config-if)# standby 1 ip 192.168.1.3 GW-1-1(config-if)# no shutdown GW-1-2(config)# interface FastEthernet 0/0 GW-1-2(config-if)# ip address 192.168.1.1 255.255.255.0 GW-1-2(config-if)# standby 1 priority 150 GW-1-2(config-if)# standby 1 preempt GW-1-2(config-if)# standby 1 ip 192.168.1.3 GW-1-2(config-if)# no shutdown IP: 192.168.1.100 Netmask: 255.255.255.0 Gateway: 192.168.1.3

Configuration statements - HSRP 192.168.1.2 192.168.1.1 GW-1-1(config)# interface FastEthernet 0/0 GW-1-1(config-if)# ip address 192.168.1.2 255.255.255.0 GW-1-1(config-if)# standby 1 priority 80 GW-1-1(config-if)# standby 1 preempt GW-1-1(config-if)# standby 1 ip 192.168.1.3 GW-1-1(config-if)# no shutdown GW-1-2(config)# interface FastEthernet 0/0 GW-1-2(config-if)# ip address 192.168.1.1 255.255.255.0 GW-1-2(config-if)# standby 1 priority 150 GW-1-2(config-if)# standby 1 preempt GW-1-2(config-if)# standby 1 ip 192.168.1.3 GW-1-2(config-if)# no shutdown IP: 192.168.1.100 Netmask: 255.255.255.0 Gateway: 192.168.1.3

Záver prezentácie Ďakujem za pozornosť. Moderné vzdelávanie pre vedomostnú spoločnosť. Projekt je spolufinancovaný zo zdrojov EÚ.