Download presentation
Presentation is loading. Please wait.
Published byJeffrey Brooks Modified over 9 years ago
1
Enabling Authentication & Network Admission Control Steve Pettit
2
Endpoint Profiling Great Bay Software Inc. Value Statements Provide the critical first step towards NAC/802.1X Dramatically shorten the deployment time for NAC and network-based authentication Provide Trusted Access to non-NAC endpoints Provide data for all network attached endpoints including: Real-time Location and Identity Historical Addressing, Identity, and Location Contextual views of all Enterprise owned assets Impact St. John’s Hospital reduced 156 man-weeks of discovery and documentation work into 2 man weeks
3
Endpoint Profiling Identifying the problem space The Enterprise LAN is comprised of a myriad of endpoint types –Windows typically comprises approximately 50% of wired endpoints –Most Enterprise endpoints are undocumented –DHCP has enabled endpoints to be added over time without IT involvement –Any Access/Admission Control system requires this information –Where WLAN is typically 30:1, Wired LAN is 1:3.5 Goal: To generate a contextual inventory of all endpoints
4
Endpoint Profiling Understanding that not all network endpoints can authenticate… All network endpoints must be Profiled and Located prior to deployment The goal is to enable secure network access for non-authenticating devices NAC Non-NAC UPSPhonePrinter
5
Endpoint Profiling Sample non-NAC Aliases Printers Fax Machines ISLs IP Phones Wireless Access Points Managed UPS Hubs MultiCast video displays Kiosks Medical imaging machines Video Conferencing stations HVAC Cash Registers Turnstiles Time Clocks Vending Machines Parking Gates Doors Firewalls Proxy Refrigerators IP Cameras Servers UNIX stations Alarm Systems RMON Probes
6
Endpoint Profiling Applications for Endpoint Profiling Authentication of non-authenticating hosts Network configuration for static access provisioning Monitoring of non-authenticating devices for behavior Addressing audit findings “do you know what is plugged into your network” Provide data for all network attached endpoints including: Real-time Location and Identity Historical Addressing, Identity, and Location Contextual views of all Enterprise owned assets
7
Endpoint Profiling The NAC Management lifecycle Discover all endpoints by type and location Model the topology Provision appropriate settings at the system level Liaise with AAA systems for authentication Provide real-time & historical Identity and Location tracking Enable adds, moves, and changes Dead ended Ports Provide contextual information to security and events management systems Monitor and Manage events & anomalies related to authentication Shadow Hosts Port Swapping Profile Changing MAC spoofing Deployment Change Control Events Management
8
Endpoint Profiling Endpoint Discovery and Mapping Profile creation - network traffic analysis –Port Mirror or Tap visibility into aggregate network traffic - L2-7 rule sets L2 - MAC - MAC vendor L3 - IP / IP range / TTL fingerprint L4 port & port ranges L7 rules – User agent, email banner, DHCP decode –Netflow Collection –Active Profiling –Boolean logic for complex rules GUI-based for AND XML for AND, OR, NOT –Inference-based Profiles Manual or Auto-created via My Network
9
Endpoint Profiling Deployment Models None - - - - - Visibility Into Network Traffic - - - - - Full Passive vs. Active Profiling MAC Vendor IP Range Static IP Web User Agent Web Server Type Print Services Web URL SMTP Banner L3 / L4 network DHCP vendor DHCP Options TTL profiling DHCP Client Host Name ARP decode Open L4 Ports Web Server Type User Agent NetFlow – L3/4 traffic
10
Endpoint Profiling Use Cases for Beacon Provide NAC for the other 50% of the Enterprise Monitoring and authorization of Non-Windows devices Enable the deployment of network-based authentication Alleviate the manual discovery process Compliment/liaise with the AAA system EAP MAC-auth EAPoX Provide Contextual information to aggregate systems: MARS IDS/IPS Asset Systems
11
Endpoint Profiling Integration Points with Cisco NAC Framework Manage NRH list Port/VLAN admin Liaise w ACS via LDAP NAC for non-CTA endpoints NAC Appliance Manage NRH list Provision MAC/Role Port/VLAN admin NAC for non-CCA endpoints MARS Contextual Event information Historical ref. Integration protocols: Web API LDAP SNMP Syslog GAME (future)
12
Endpoint Profiling Summary Reduces 156 man weeks of work to 2 weeks Automated discovery and system-level provisioning Ongoing monitoring of non-NAC endpoints Flexible Deployment model
13
Endpoint Profiling
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.