Cisco Self Defending Network
Total Page:16
File Type:pdf, Size:1020Kb
Cisco Self Defending Network Mai 2007 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1 Intelligent Networking Using the Network to Enable Business Processes Cisco Network Strategy Utilize the Network to Unite Isolated Layers and Domains to Enable Business Processes Connectivity Intelligent Networking Business Networked Processes Infrastructure • Active participation in application and service delivery • A systems approach integrates Resilient technology layers to reduce Integrated complexity Adaptive • Flexible policy controls adapt this intelligent system to your Applications business though business rules and Services Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2 When it comes to information security, what are the objectives? Adaptive On Demand Agile Align security practice Organization Organization and policy to business requirements. Security that’s a business enabler, not an inhibitor. Keep costs appropriate: It’s not necessarily about reducing costs, but rather, spending where it counts the most • The network touches all Reduce complexity of parts of the infrastructure the overall environment • It is uniquely positioned to Control and contain threats so help solve these issues they don’t control you Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3 Self-Defending Network Defined Efficient Security Management, Control, Operational Management and Response and Policy Control Advanced technologies and security services to Threat Control Secure • Mitigate the effects and Containment Transactions of outbreaks • Protect critical assets Confidential Communications • Ensure privacy Secure Network Network as Platform Platform Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4 Self-Defending Network – “Le réseau peut identifier, s’adapter et ..... répondre aux attaques” Succursale Les 3 Pilliers du SDN: Intégration Collaboraton MARS & CSM Réaction PCs Détection D’Intrusion WAAS CSA – Cisco Security “Distribution automatique Agent des signatures” Wan avec SONA chiffrement Prévention Cisco Commutateurs Routeur Pare-Feu ISR d’Intrusion NAC ASA WAAS FW FW Serveurs IPS VPN VPN IPS “Vision limitée, Anti-X précision limitée CSA Prévenir la propagation de Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential virus et des vers 5 Programme Authentification Internet Intranet Qui peut accéder le réseau L’impact de la téléphonie 802.1x, les visiteurs, Web Base . Authentification La conformité des postes au moment de la connexion Si Si Sur le LAN, en VPN, etc... Les bonnes pratiques pour le contrôle des usagers connectés au Si Si réseau Fonctions de sécurité présentent dans les commutateurs Cisco QoS déployée? Cisco Securité Agent (CSA) La surveillance et la configuration du réseau Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6 Cisco Self Defending Network Authentification et Autorisation 802.1q 802.3 - (Sans étiquette 802.1q) 802.3 - (Sans étiquette 802.1q) Bande passante Réservée Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7 IEEE 802.1x Standard set by the IEEE 802.1 working group Is a framework designed to address and provide port-based access control using authentication Primarily 802.1x is an encapsulation definition for EAP over IEEE 802 media—EAPOL (EAP over LAN) is the key protocol Layer 2 protocol for transporting authentication messages (EAP) between supplicant (user/PC) and authenticator (switch or access point) Assumes a secure connection Actual enforcement is via MAC-based filtering and port-state monitoring Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8 Some IEEE Terminology IEEE Terms Normal People Terms Supplicant Client Authenticator Network Access Device Authentication Server AAA/RADIUS Server Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9 802.1x Port Access Control Model Authenticator Identity Store/Management • Switch • MS AD • Router • LDAP • WLAN AP • NDS • ODBC Request for Service Backend Authentication Identity Store (Connectivity) Support Integration Supplicant Authentication Server • Desktop/laptop • IAS • IP phone • ACS • WLAN AP • Any IETF RADIUS server • Switch Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10 A Closer Look: 802.1x, STP Port Unauthorized Cisco IOS aaa authentication dot1x default group radius aaa authorization network default group radius radius-server host 10.100.100.100 radius-server key cisco123 dot1x system-auth-control interface GigabitEthernet1/0/1 dot1x port-control auto CatOS set radius server 10.100.100.100 set dot1x system-auth-control enable set port dot1x 3/1 port-control auto Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11 A Closer Look: 802.1x, STP Port Unauthorized EAPOL-Start EAP-Identity-Request EAP-Identity-Response 802.1x Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12 A Closer Look: 802.1x, STP Port Unauthorized EAPOL-Start EAP-Identity-Request EAP-Identity-Response EAP—Method Dependent EAP-Auth Exchange Auth Exchange w/AAA Server EAP-Success/Failure Authentication Successful/Rejected 802.1x RADIUS Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13 A Closer Look: 802.1x, STP Port Unauthorized EAPOL-Start EAP-Identity-Request EAP-Identity-Response EAP—Method Dependent EAP-Auth Exchange Auth Exchange w/AAA Server EAP-Success/Failure Authentication Successful/Rejected Port Authorized Policy Instructions 802.1x RADIUS Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14 A Closer Look: 802.1x, STP Port Unauthorized EAPOL-Start EAP-Identity-Request EAP-Identity-Response EAP—Method Dependent EAP-Auth Exchange Auth Exchange w/AAA Server EAP-Success/Failure Authentication Successful/Rejected Port Authorized Policy Instructions Port Unauthorized EAPOL-Logoff 802.1x RADIUS Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15 A Closer Look: 802.1x, STP Port Unauthorized EAPOL-Start EAP-Identity-Request EAP-Identity-Response EAP—Method Dependent EAP-Auth Exchange Auth Exchange w/AAA Server EAP-Success/Failure Authentication Successful/Rejected Port Authorized Policy Instructions Port Unauthorized EAPOL-Logoff Actual Authentication Conversation Is Between Client and Auth Server Using EAP; the Switch Is an EAP Conduit, but Aware of What’s Going on 802.1x RADIUS Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16 802.1x: Default Operation No EAPOL 802.1x Process Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17 802.1x: Default Operation No EAPOL EAPOL-Request (Identity) 802.1x Process X D = 01.80.c2.00.00.03 1 Upon Link Up Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18 802.1x: Default Operation No EAPOL EAPOL-Request (Identity) 802.1x Process D = 01.80.c2.00.00.03 1 Upon Link Up X EAPOL-Request (Identity) 2 30 Seconds X D = 01.80.c2.00.00.03 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19 802.1x: Default Operation No EAPOL EAPOL-Request (Identity) 802.1x Process D = 01.80.c2.00.00.03 1 Upon Link Up X EAPOL-Request (Identity) 30 Seconds D = 01.80.c2.00.00.03 2 X EAPOL-Request (Identity) 3 30 Seconds X D = 01.80.c2.00.00.03 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20 802.1x: Default Operation No EAPOL EAPOL-Request (Identity) 802.1x Process D = 01.80.c2.00.00.03 1 Upon Link Up X EAPOL-Request (Identity) 30 Seconds D = 01.80.c2.00.00.03 2 X EAPOL-Request (Identity) 3 30 Seconds X D = 01.80.c2.00.00.03 Any 802.1x-enabled switch port will send EAPOL identity-request frames on the wire (whether a supplicant is there or not) Switch defaults to no supplicant being on the wire based on no EAPOL response to its requests No network access is given Transient state; whole process restarts after a hold timer Process can start again if a supplicant appears on the port Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21 802.1x with Guest VLAN No EAPOL 802.1x Process Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22 802.1x with Guest VLAN No EAPOL EAPOL-Request (Identity) 802.1x Process X D = 01.80.c2.00.00.03 1 Upon Link Up Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23 802.1x with Guest VLAN No EAPOL EAPOL-Request (Identity) 802.1x Process D = 01.80.c2.00.00.03 1 Upon Link Up X EAPOL-Request (Identity) 2 30 Seconds X D = 01.80.c2.00.00.03 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24 802.1x with Guest VLAN No EAPOL EAPOL-Request (Identity) 802.1x Process D = 01.80.c2.00.00.03 1 Upon Link Up X EAPOL-Request (Identity) 30 Seconds D = 01.80.c2.00.00.03 2 X EAPOL-Request (Identity) 3 30 Seconds √ D = 01.80.c2.00.00.03 Presentation_ID © 2006 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25 802.1x with Guest VLAN No EAPOL EAPOL-Request (Identity) 802.1x Process D = 01.80.c2.00.00.03 1 Upon Link Up X EAPOL-Request (Identity) 30 Seconds D = 01.80.c2.00.00.03 2 X EAPOL-Request (Identity) 3 30 Seconds √ D = 01.80.c2.00.00.03 CatOS set port dot1x 5/1 guest-vlan 10 IOS dot1x guest-vlan 10 Any 802.1x-enabled switch port