Download presentation
1
Port Based Network Access Control
IEEE 802.1X Port Based Network Access Control
2
Definition “Port-based network access control allows a network administrator to restrict the use of IEEE 802 LAN service access points (ports) to secure communication between authenticated and authorized devices.” “IEEE Std 802.1X specifies an architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and secure communication between the ports.”
3
Definition “Port-based network access control allows a network administrator to restrict the use of IEEE 802 LAN service access points (ports) to secure communication between authenticated and authorized devices.” “IEEE Std 802.1X specifies an architecture, functional elements, and protocols that support mutual authentication between the clients of ports attached to the same LAN and secure communication between the ports.” Layer 2 Access to the medium. Access control applied to ports. Authentication. Secure communication.
4
Basic Topology There are three elements:
The Supplicant which in this example is a wireless Client A. The Authenticator which in this case is a wireless access point WAP. The Authentication Server.
5
Extensible Authentication Protocol EAP
The IEEE 802.1X standard specifies the use of EAP, the Extensible Authentication Protocol (RFC 3748) to support authentication using a centrally administered Authentication Server. The implementation of EAP was initially defined for PPP protocols; however, our main focus is in the use in LAN networks. Consequently, the standard also defines EAP encapsulation over LANs (EAPoL) to convey the necessary exchanges between the supplicant and the authenticator.
6
EAPoL Format Nothing more than an EAP message encapsulated by an Ethernet Frame. That’s all . Destination Source Type 888EH EAP Message Version Length Value
7
Association Phase All traffic Client A, the supplicant, associates with the Wireless Access Point WAP. This is equivalent to connecting a cable to a LAN switch port. In such case, there are electrical signals, but nothing more significant is going on. All traffic is blocked at the WAP Authenticator.
8
Jargon EAP Other traffic In the initial stage of authentication, only EAP messages are accepted. The technical jargon for this is Open Uncontrolled Virtual Port. Any other traffic is blocked and ignored at the authenticator. The technical jargon for this is Closed Controlled Virtual Port. In reality, the ports do not even exist, this is just technical babble. It is simply that the Authenticator listens to authentication messages and ignores/blocks anything else, that’s all.
9
EAP Transactions EAPoL-Start Other traffic The supplicant sends a EAP message start encapsulated inside a WLAN frame (EAPoL). The message is an EAPoL-start.
10
EAP Transactions EAP-request-id Other traffic EAP-response-id The WLAN Authenticator reply with an EAP-request-identity. The supplicant client responds with the username in clear-text
11
EAP Transactions EAP-response-id Other traffic RADIUS or TACACS+ The Authenticator sends now a RADIUS or TACACS+ message. Let’s assume that we are just using RADIUS for simplicity of the explanation.
12
EAP Transactions EAP Other traffic RADIUS or TACACS+ EAP messages do not continue unchanged toward the authentication server. The authenticator talks another protocol, like RADIUS or TACACS+ to the Authentication Server. So, in one hand, the authenticator talks EAP and in the other RADIUS or TACACS+. WAP is a proxy or translator or intermediary.
13
RADIUS –access-request
EAP Transactions EAP-response-id Other traffic RADIUS –access-request The EAP response with the username, triggers a RADIUS message access request. RADIUS Authentication Server receives the message and checks the policies and user database to find a match. RADIUS server prepares a reply message.
14
RADIUS –access-challenge
EAP Transactions Other traffic RADIUS –access-challenge RADIUS server prepares a reply message. Radius server replies with an Access Challenge. The WAP authenticator translates the RADIUS message to an EAP message which is sent to the supplicant.
15
RADIUS –access-challenge
EAP Transactions Other traffic EAP challenge RADIUS –access-challenge The WAP authenticator translates the RADIUS message to an EAP message which is sent to the supplicant as an EAP challenge-request. The Supplicant receives the message and it prepares an answer.
16
RADIUS –access-challenge
EAP Transactions EAP challenge telecomS144 RADIUS –access-challenge MD5 AX1Z05FE2CD48 The Supplicant receives the message and it prepares an answer. It hashes a password with a well known algorithm.
17
EAP Transactions AX1Z05FE2CD48 MD5 telecomS144 Challenge Response The Supplicant receives the message and it prepares an answer. It hashes a password with a well known algorithm. It answers the challenge with a EAP-Challenge-Response.
18
RADIUS-Access-Request
EAP Transactions RADIUS-Access-Request AX1Z05FE2CD48 MD5 telecomS144 Challenge Response The authenticator sends a RADIUS message Access-Request that contains the HASH to the Radius Server. The Radius Server runs an stored password thru the same algorithm to find if the result matches the HASH received.
19
RADIUS-Access-Request
EAP Transactions RADIUS-Access-Request AX1Z05FE2CD48 MD5 telecomS144 AX1Z05FE2CD48 MD5 telecomS144 Challenge Response The authenticator sends a RADIUS message Access-Request that contains the HASH to the Radius Server. The Radius Server runs an stored password thru the same algorithm to find if the result matches the received HASH.
20
RADIUS –access-accept
EAP Transactions RADIUS –access-accept EAP success The supplicant receives the approval of authentication. The final part of the authentication process is the creation of a dynamic encryption key. IEEE i describes this process which is called Robust Security Network (RSN) with two new protocols, the 4-Way Handshake and the Group Key Handshake
21
Radius TACACS+ IEEE 802.1X
22
IEEE 802.1x IEEE 802.1X is the IEEE standard for Port based Network Access Control . It provides an authentication mechanism to devices attaching to LAN or WLAN infrastructure. IEEE 802.1X defines the encapsulation of the Extensible Authentication Protocol over Ethernet type networks. 802.1X authentication involves three parties: A supplicant (which is a CLIENT) An authenticator (an access point) An authentication server (a RADIUS server)
23
IEEE 802.1x The authenticator (access point) acts like a security guard to a protected network. The supplicant (CLIENT) is not allowed access through the authenticator (access point) to the protected side of the network until the supplicant’s identity has been validated and authorized.
24
IEEE 802.1x The supplicant presents credentials, (user name / password or a digital certificate), to the authenticator. The authenticator forwards the credentials to the authentication server for verification. If the authentication server determines the credentials are valid, the supplicant (client device) is allowed to access resources located on the protected side of the network.
25
Cisco Support Cisco implementation of RADIUS is compatible with Microsoft PEAP-MS-CHAP-v2 and PEAP-GTC. Cisco proprietary product ACS includes Radius and TACACS+ implementation. TACACS+ is Cisco only.
26
RADIUS/TACACS+ RADIUS is a distributed client/server system that secures networks against unauthorized access. RADIUS clients run on Cisco routers and relays authentication requests to a central RADIUS server that contains all user authentication and network service access information.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.