Packetfence – Version 1.7.5
Total Page:16
File Type:pdf, Size:1020Kb
PacketFence – version 1.7.5 Installation and Confguration Guide Copyright © 2008 Inverse inc. (http://inverse.ca) Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled “GNU Free Documentation License”. Version 1.7.5 – October 2008 Contents Chapter 1 About this Guide .............................................................................................................. 3 Chapter 2 Introduction .......................................................................................................................4 How does VLAN isolation work ? ............................................................................. 5 Blocking malicious activities with violations .............................................................7 New features in 1.7.5 ...............................................................................................9 Bugs fxed in 1.7.5 ................................................................................................... 9 Chapter 3 System Requirements .................................................................................................... 10 Assumptions .......................................................................................................... 10 Minimum Hardware Requirements .........................................................................11 Operating System Requirements .............................................................................12 Chapter 4 Installation .......................................................................................................................13 OS Installation ....................................................................................................... 13 Software Downloads .............................................................................................. 14 Software Installation ...............................................................................................14 Chapter 5 Confguration ...................................................................................................................16 General Confguration ............................................................................................16 Apache Confguration ............................................................................................ 16 Authentication (fat fle, LDAP, Radius) ................................................................... 16 VLAN isolation ...................................................................................................... 18 Violations .............................................................................................................. 26 Starting Services .....................................................................................................27 Chapter 6 Testing ...............................................................................................................................28 PacketFence Web Interface .....................................................................................28 VLAN Isolation ...................................................................................................... 28 Chapter 7 Appendix A: pf.conf ....................................................................................................... 30 Chapter 8 Appendix B: Switches supported by PacketFence .................................................... 53 Chapter 9 Appendix C: Switch Confguration ..............................................................................55 3COM ................................................................................................................... 55 Cisco ..................................................................................................................... 56 D-Link ................................................................................................................... 59 Dell ....................................................................................................................... 60 Edge-corE .............................................................................................................. 60 Enterasys ................................................................................................................60 HP ProCurve ..........................................................................................................61 Intel .......................................................................................................................64 Linksys ...................................................................................................................64 Nortel ....................................................................................................................64 Chapter 10 Appendix D: Additional Softwares ............................................................................. 67 Nessus ...................................................................................................................67 Snort ......................................................................................................................67 Oinkmaster ............................................................................................................67 Chapter 11 Additional Information ................................................................................................. 68 Chapter 12 Commercial Support and Contact Information ......................................................... 69 Chapter 13 GNU Free Documentation License .............................................................................. 70 Chapter 1 1 About this Guide This guide will walk you through the installation and confguration of the PacketFence solution. It covers VLAN isolation setup. The instructions are based on version 1.7.5 of PacketFence. The latest version of this guide is available at http://inverse.ca/uploads/docs/PacketFence_Installation_Guide.pdf. © 2008 Inverse inc. About this Guide 3 Chapter 2 2 Introduction PacketFence is an open-source network access control (NAC). PacketFence features: ❏ Registration of new network devices through a captive portal. Confgurable options exist for registration “windows” – absolute or relative time periods during which users may skip registration with periodic reminders. An Acceptable Use Policy can be specifed such that users cannot enable network access without frst accepting it. The duration of a node registration can be a relative value (eg. “four weeks from frst network access”) or an absolute date (eg. “Thu Jan 20 20:00:00 EST 2009”). ❏ Detection of abnormal network activities (computer virus, worms, spyware, etc.) including from remote Snort sensors. Beyond simple detection, PacketFence layers its own alerting and suppression mechanism on each alert type. A set of confgurable actions for each violation is available to administrators: email, log, trap. ❏ Proactive vulnerability scans: Nessus vulnerability scans can be performed on a scheduled or ad-hoc basis. A host can be scanned at registration, allowing administrators to isolate infected machines. PacketFence correlates the Nessus vulnerability ID’s of each scan to the violation confguration, returning content specifc web pages about which vulnerability the host may have. ❏ Isolation and user-directed mitigation/remediation: Once trapped, all HTTP, IMAP and POP sessions are terminated by the PacketFence system. Based on the nodes current status (unregistered, open violation, etc), the user is redirected to the appropriate URL. In the case of a violation, the user will be presented with removal instructions for the particular infection he/she has.A maximum number of re-enables, also confgurable per violation, exists to permanently disable access if the user cannot solve the problem on his/her own. ❏ Web-based and command-line interfaces for management tasks ❏ Three different trapping mechanisms: ARP, DHCP and VLAN. • ARP allows to much more control over policy violations, but requires that PacketFence has a local interface to all networks (must sit in front of the router). • DHCP allows to have one PacketFence system in a remote location controlling many networks (Router will Relay DHCP requests). The down side is that you must replace your existing DHCP server with PacketFence, that static IPs can bypass isolation, and that the DHCP lease time will need to expire (50-100% of lease time) before a host can be put into isolation. • VLAN isolation allows you to totally isolate devices from the network by putting them in separate (non routed) VLANs. You need to create two VLANs: registration and isolation and then confgure your switches to send SNMP traps to PacketFence. VLAN isolation is available in 1.7 and later. © 2008 Inverse inc. Introduction 4 Chapter 2 ❏ DHCP fngerprinting which can be used to automatically register VoIP phones, game consoles and more ❏ VoIP support (even in heterogeneous environments) for multiple switch vendors (Cisco, Edge- Core, HP, LinkSys, Nortel Networks and many more) ❏ 802.1X support through a FreeRADIUS module ❏ Wireless integration with FreeRADIUS which allows you to secure your wired and wireless networks (different APs and Cisco WLC) the same way PacketFence