1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Filtering and Security By Mohammad Shanehsaz June 2004.
Chapter 19: Network Management Business Data Communications, 5e.
Implementing a Highly Available Network
Page # Advanced Telecommunications/Information Distribution Research Program (ATIRP) Authentication Scheme for Distributed, Ubiquitous, Real-Time Protocols.
Ubiquitous Access Control Workshop 1 7/17/06 Access Control and Authentication for Converged Networks Z. Judy Fu John Strassner Motorola Labs {judy.fu,
802.1x EAP Authentication Protocols
Protected Extensible Authentication Protocol
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
(Remote Access Security) AAA. 2 Authentication User named "flannery" dials into an access server that is configured with CHAP. The access server will.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Georgy Melamed Eran Stiller
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Integrated Security Model for SNMPv3 (ISMS) pronounced "is" "miss" David T. Perkins & Wes Hardaker 60 th IETF August 6, 2004.
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
Course 201 – Administration, Content Inspection and SSL VPN
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 7 City College.
Information Security Depart. of Computer Science and Engineering 刘胜利 ( Liu Shengli) Tel:
Mobile and Wireless Communication Security By Jason Gratto.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 5 City College.
PPSP Tracker Protocol draft-gu-ppsp-tracker-protocol PPSP WG IETF 82 Taipei Rui Cruz (presenter) Mário Nunes, Yingjie Gu, Jinwei Xia, David Bryan, João.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
IPv6 Network Assessor 111 © 2005 Cisco Systems, Inc. All rights reserved. Susan Shareshian Solutions Manager, Cisco Systems, Inc.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Chapter 3: Authentication, Authorization, and Accounting
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Cisco’s Secure Access Control Server (ACS)
Slide 1 SNMPv3, SSH & Cisco Matthew G. Marsh Chief Scientist of the NEbraskaCERT.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 7 – Secure Network Architecture and Management.
SNMP Simple Network Management Protocol SNMP Simple Network Management Protocol Haris Ribic.
Network Management Security
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved. CNIT 221 Security 1 ver.2 Module 6 City College.
Chapter 3: Authentication, Authorization, and Accounting
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Network Management Security
November 2005IETF 64, Vancouver, Canada1 EAP-POTP The Protected One-Time Password EAP Method Magnus Nystrom, David Mitton RSA Security, Inc.
AAA Services Authentication -Who ? -Management of the user’s identity Authorization -What can the user do? -Management of the granted services Accounting.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Configuring AAA requires four basic steps: 1.Enable AAA (new-model). 2.Configure security server network parameters. 3.Define one or more method lists.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Presentation at ISMS WG Meeting1 ISMS – March 2005 IETF David T. Perkins.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
Cisco Exam Questions IMPLEMENTING CISCO IOS NETWORK SECURITY (IINS V2.0) VERSION: Presents: 1.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Port Based Network Access Control
Instructor Materials Chapter 5: Network Security and Monitoring
© 2002, Cisco Systems, Inc. All rights reserved.
Chapter 5: Network Security and Monitoring
Chapter 8: Monitoring the Network
Chapter 5 SNMP Management
Chapter 5 SNMP Management
Presentation transcript:

1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt August, 2004

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 2 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 2 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 2 Deployment issues with SNMPv3 SNMPv3 does not integrate well with administrative security schemes defined for existing management interfaces like the device command line interfaces. –Unified identity is key, cannot have separate user islands for CLI and SNMP. SNMPv3 standard does not address the issue of management and distribution of the keying material for SNMP – User and User keys need to be configured on a per agent basis, it does not scale, same issues as local telnet passwords.

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 3 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 3 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 3 Design Considerations The requirement of a Security Model for SNMPv3 - To integrate SNMPv3 authentication with external AAA server to unify the approach to administrative security for SNMPv3 and CLI. - To use strong authentication and key exchange, eliminating need to use long term secrets to protect SNMPv3 packets. - To minimize number of changes, preferably none, to SNMPv3 packet format given the current status of the SNMPv3 standard. The Security Model MUST - extend capability of the AAA server to provide authentication, privacy and integrity protection for SNMPv3 agents. - provide support for variety of client authentication mechanisms including passwords, tokens and certificates. - optimize key management scheme to scale to large numbers of agents. - ensure a separate AAA request is not generated for every SNMP request. - be generic and should apply to existing and future AAA protocols.

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 4 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 4 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 4 EUSM Overview SNMP Manager SNMPv3 Agent AAA Response Return SNMPv3 session keys Return SNMPv3 localized auth. and priv. keys derived from the master session key for this particular security context Return cache lifetime. Return User Group EAP exchange Establish Security Context & Master Session Key AAA Request Get SNMPv3 session keys Pass UserName & IP Address of the Manager to index the security context SNMPv3 Packet AAA Server

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 5 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 5 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 5 EUSM Overview Definition of External User Security Model (EUSM) for SNMPv3, a new security model for SNMPv3. EUSM will use AAA protocols to obtain keying material for the user from the AAA server for achieving the security goals defined for USM Security Context setup between the SNMPv3 Manager and the AAA server using EAP. PEAP is the recommended EAP method. The security context establishment authenticates the peers and setups master session keys at the SNMPv3 Manager and AAA server The master session keys are localized to generate per agent SNMPv3 authentication and privacy keys. SNMPv3 Agents request for keys from the AAA server using RADIUS (or TACACS+) based on network element configuration. Keys distributed by the AAA server to the agents are cached for short durations at the agent, this avoids the need for an external AAA call for every SNMPv3 operation.

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 6 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 6 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 6 EUSM with EAP between Manager and AAA Server SNMP Manager SNMPv3 Agent EAP Exchange Establish Security Context AAA Protocol Acquire Localized Session Keys SNMPv3 Packet Network Management Operation AAA Server

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 7 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 7 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 7 EUSM with EAP in the 802.1x like model SNMP Manager SNMPv3 Agent EAP Exchange Establish Security Context AAA Protocol Acquire Localized Session Keys SNMPv3 Packet Network Management Operation AAA Server AAA Protocol {EAP Exchange Establish Security Context}

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 8 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 8 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 8 SNMPv3 Trap and Inform Processing The SNMPv3 EUSM Trap processing uses an identical flow as specified for SNMPv3 request processing. –The SNMPv3 Manager is responsible for the setup of the master session key at the AAA server. –The authoritative engine is the SNMPv3 agent. The SNMPv3 agent requests for session keys from AAA server to use for protecting SNMPv3 traps. The SNMPv3 EUSM Inform processing uses an identical flow as specified for the SNMPv3 request processing, except that the roles are reversed between the SNMPv3 manager and agent –The SNMPv3 Agent is responsible for the setup of the master session key at the AAA server. –The agent generates session keys from the master session key based on the engine ID of the Inform recipient, i.e. the SNMPv3 Manager. –The authoritative engine is the SNMPv3 manager. The SNMPv3 manager requests for session keys from the AAA server.

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 9 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 9 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 9 EUSM Inform Processing SNMP Manager SNMPv3 Agent EAP Exchange Establish Security Context AAA Protocol Acquire Localized Session Keys SNMPv3 Inform AAA Server

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 10 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 10 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 10 EUSM with RADIUS for Key Distribution SNMP Manager SNMPv3 Agent RADIUS (Key_Response) Key (Key, IV, Key ID, Lifetime, App ID, KEK ID) SNMP-Protection-Type SNMP-Group-Name RADIUS Access_Request/ Access_Accept PEAP Exchange RADIUS (Key_Request) Key (App ID) Calling-Station-ID UserName SNMPv3 Packet RADIUS Server

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 11 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 11 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 11 Key Caching Session keys are cached at the SNMPv3 agent typically for duration of seconds. –The common pattern of manager-agent interaction is in bursts with a duration of less than 90 seconds. Master Session Key is cached for the duration of hours. Residual timer on the master session key used to address cache synchronization issues. Key durations are configurable entities on the AAA server.

Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 12 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 12 Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. 12 Implementation Status We wanted to provide the BOF with feedback from an implementation. EUSM prototype implementation in IOS close to completion. EUSM prototype implementations in Cisco AAA server (Ciscosecure ACS) and Ciscoworks applications currently in progress. So far, no implementation problems.