Download presentation
Presentation is loading. Please wait.
Published byBartholomew Charles Modified over 7 years ago
1
Implementing Network-Edge Security with 802.1x
Enhancements to all areas of Organizational Security Michael Votaw RCC-E Network Monitoring Team Lead
2
Overview Network based Authentication IEEE 802.1X Authentication
RFC 3580 and Enhancements Network Access Control Security Tools Enhancements
3
Network Based Authentication
What are we really talking about? Types of authentication MAC Authentication (MAB) IEEE 802.1X Who, Where, When? – What is the value History and forensics Authentication sources - RADIUS Microsoft 2003 IAS / Microsoft 2008 NPS FreeRADIUS Steel-belted RADIUS Many, Many, others The benefits of Automation with this new information
4
IEEE 802.1X Authentication History
Authored by Members from Microsoft, Cisco, Enterasys, HP Ratified in late 2001 What need did it fill? How it is used? Centralized command and control Port control without the tedious work DHCP Phobias Who supports it? Switch Vendors – Extreme/Enterasys, Cisco, Brocade/Foundry, HP, many others Operating systems – Microsoft XP, Vista, 7&8, Mac OS X, Linux, others Devices – IP phones from Avaya, Seimens, Cisco, and many more Devices – Print Servers from HP, Lexmark, Xerox How does it work?
5
Authentication Server (RADIUS)
802.1X Basic Components User Supplicant Network Device Authentication Server (RADIUS) Valid user (AD/RADIUS) Printer Phone Certificate-Based Microsoft XP, Vista, 7 & 8 Mac OS X Linux Open1X Printers Phones Enterasys Cisco Foundry Extreme HP Many others Windows AD FreeRADIUS OpenRADIUS Steel-Belted RADIUS
6
802.1X Basic Flow Username/Password RADIUS Attributes -Filter-Id
-Tunnel-Priv-Grp-ID RADIUS Attributes -User-Name -NAS-IP-Address -NAS-Port -NAS-Port-Type
7
Before Authentication
Basic 802.1X Port Control Before Authentication After Authentication
8
802.1X Message Exchange All messages on client side are ethertype 888E (EAPOL/PAE) All messages between switch and server are RADIUS packets Most switch vendors enhance this with multi-method and multi-user authentication
9
802.1X Continued Support for periodic re-auth, and manual re-auth
EAP Types - Industry Standard MD5 – basic PEAP – Microsoft & Cisco Protected EAP, Now dominate in the industry EAP-TLS (Transparent LAN Service) Requires a digital certificate on each supplicant (see RFC 2716) EAP Types – Proprietary EAP-TTLS (Tunneled TLS Authentication Protocol) - Juniper Software TTLS does not require digital cert (see Internet Draft) LEAP – Cisco Lightweight EAP (proprietary); Cisco moving to PEAP 802.1X on wireless Encryption, Rotating keys, Integration of Users and Enterprise Authentication The Future – 802.1AE Key exchange and encryption between clients, switches, and routers
10
Enhancing 802.1X Dynamic VLAN support (RFC 3580) Dynamic ACL support
Dynamically assign a user, phone, or device to a VLAN based on RADIUS response Can allow for user mobility throughout the enterprise Dynamic ACL support Restrict unauthorized protocols Enhance others with QoS(phone, critical applications) Multi-User Most enterprise-class switches today support multiple users authenticating per port Multi-Method Many vendors support MAC+802.1X to help with supplicant support PAE Mib SNMP access, control, and statistics over the 802.1X experience Guest Access Many vendors support an auth-fail VLAN, or provide alternate access support
11
Basic Steps for Implementation in a Lab
Setup NPS on Microsoft AD Simple configuration No Certificates Enable 8021.X on your network device Setup your RADIUS server Turn on 802.1X with “dot1x” commands Setup Windows 7 Go with Protected EAP Don’t validate server certs Deselect “Automatically use my windows logon name” Once tested, move to more secure model using host and server certificates (strong, mutual authentication) A phased approach can be used, enabling only some users and network devices. Group policy can be employed for configuration of end-systems
12
Basic NPS Setup
13
Configuration of RADIUS Clients
14
NPS Can Permit/Deny Based on Groups
15
EAP Methods Configured
16
Adding RADIUS Attributes
17
Basic Switch Config (Cisco)
aaa authentication dot1x default group radius aaa authorization network default group radius dot1x system-auth-control ip radius source-interface Vlan99 radius-server attribute nas-port format c radius-server host auth-port 1812 acct-port 1813 key #$TR3g42f34yytV3r4f radius-server vsa send accounting radius-server vsa send authentication interface FastEthernet0/17 switchport mode access authentication port-control auto authentication periodic dot1x pae authenticator dot1x timeout tx-period 3 spanning-tree portfast
18
Basic Switch Configuration (Brocade/Foundry)
dot1x-enable re-authentication timeout quiet-period 30 timeout re-authperiod 2000 timeout tx-period 3 auth-fail-vlanid 10 enable ethe 1 to 16 aaa authentication dot1x default radius hostname fesx448 radius-server host auth-port 1812 acct-port 1813 default key 1 $fl%}lq9}%0qPf:}%fBPfl dot1x interface ethernet 1 dot1x port-control auto dot1x disable-filter-strict-security port-name rm101-sw1-e1
19
MAC Authentication Authenticates a device using the source MAC address of received packets Overview of Authentication Process The authenticator (switch) sends the following as credentials for authentication: Username: Source MAC of end system Format of MAC address is XX-XX-XX-XX-XX-XX Password: Locally configured password on the switch Username and password sent to backend RADIUS server for authentication If credentials are valid, RADIUS Access-Accept message (possibly with Filter-ID or Tunnel attributes) is returned to switch MAC authentication enables switches to authenticate end systems that do not support an 802.1X supplicant or web browser (e.g. printers) to the network No special software is required for an end system to MAC authenticate
20
Client Configuration
21
Network Access Control – The Next Step
NAC and 802.1X are not the same The 5 functions of NAC Detection Authentication Authorization Assessment Remediation 802.1X provides a foundation by filling the first three phases of NAC Using RFC 3580, control can be exercised over the VLAN or ACL Log data can be sent to log servers, historical and forensic information
22
Network Access Control – The Next Step
Information now available to NAC solutions… MAC address of client The Username Exact port where request came from The IP of the switch The method of authentication (MAC, 802.1X) The IP address (through DHCP snooping) The time of Login The time of Logout Any VLAN or ACL that was applied
23
NAC Dashboard – End Systems View
© 2013 Enterasys Networks, Inc All rights reserved Enterasys Confidential
24
How Network-Auth Enhances Security Tools
Integrate Network Authentication User tracking with Security Information Management capabilities. Result: Track down systems that cause security breaches with new levels of speed and accuracy.
25
IEEE 802.1X Conclusion The primary reason for using 802.1X authentication in your network is security, protecting against: Unauthorized access to a network Denial of Service (DoS) attacks Theft of services Support: Most all enterprise class switches support 802.1X authentication More and more operating systems and network attached devices
26
Reference Information
IEEE 802.1X - Port Based Network Access Control IEEE 802.1X - Overview RFC 3580 Information Using 802.1X Port Auth To Control Who Can Connect To Your Network 802.1X Port-Based Authentication HOWTO. Setting up XSupplicant. Configuring IEEE 802.1X for Mac OS X
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.