Session Presentation
Total Page:16
File Type:pdf, Size:1020Kb
#CLUS Securely Designing Your Wireless LAN for Threat Mitigation, Policy and BYOD Ali H. Ali Technical Marketing Engineer CCIE – 44526 (Wireless) BRKEWN-2005 #CLUS Session Objectives What this session will cover… …and what it won’t… • AP and WLC secure • configuration details; connection; • version discrepancies; • wireless radio threats; • roadmap; • secure/open SSID • IPv6; BRKEWN-2010 fundamentals; BRKIP6-2191 • not too much for guests. • client secure connection options; BRKEWN-2014 • use cases; …except when it does. • mainly CUWN and AireOS. #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 3 BRKEWN-2670 Disclaimer New kids on the block • Catalyst 9800 Wireless Controllers based on IOS-XE. • Support for (almost) the same security features as for AireOS based Wireless LAN Controllers (i.e., Mobility Express, vWLC, 3504, 5520, 8540). • Dedicated references will be provided in case of specific configuration examples. #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 4 For your For your reference reference • There are slides in your PDF that will not be presented, or quickly presented. • They are valuable, but included only “For your reference”. For your reference #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 5 Cisco Webex Teams Questions? Use Cisco Webex Teams to chat with the speaker after the session How 1 Find this session in the Cisco Live Mobile App 2 Click “Join the Discussion” 3 Install Webex Teams or go directly to the team space 4 Enter messages/questions in the team space Webex Teams will be moderated cs.co/ciscolivebot#BRKEWN-2005 by the speaker until June 16, 2019. #CLUS © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 6 We do everything by the book… Not that much left on TV anyway… http://www.ciscopress.com/store/ccie-wireless-v3-study-guide-9781587206207 #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 7 For your Session Abstract reference • Learn how to design a secure wireless networks from A to Z. • In this session we will cover some of the major threats associated with wireless networks and the tools we have to mitigate and prevent them, such as rogue AP detection, wIPS and spectrum intelligence. • We will also take a look at the principles of secured wireless networks (encryption, 802.1X, guest access, etc.) and will dive into the latest identity services available to address different kinds of devices (laptops, tablets, smartphones, etc.) and users (employees, guests, contractors, etc.). • Prerequisites: knowledge of 802.11 and 802.1X fundamentals is recommended. #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 8 Agenda • Secure the infrastructure • Over the Air Security • Secure the clients • Use cases #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 9 Secure the infrastructure Securing the infrastructure • How to secure the AP connectivity and access. Access Point Wireless LAN Controller (AP) Data Encapsulation – UDP 5247 (WLC) Control Messages – UDP 5246 • How to secure the CAPWAP communication between the WLC and the AP. • How to secure the radio: • Intrusion detection/prevention; • Rogue access points; • Interferences. #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 11 For your WLC connectivity and access reference WLC HTTP / HTTPS / telnet / SSH Control requests from wireless clients or wired clients on the same subnet as a dynamic interface: (Cisco Controller) >config network mgmt-via-wireless enable (Cisco Controller) >config network mgmt-via-dynamic-interface enable * * Available via CLI only and needed when sourcing RADIUS traffic from a dynamic interface instead of the management one. #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 12 For your WLC connectivity and access reference WLC HTTP / HTTPS / telnet / SSH Control requests from specific networks/clients through CPU ACLs: http://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/109669-secure-wlc.html#t4 Logical example (not a real configuration one): • deny tcp [other client subnets] [WLC mgmt IP] eq 443 • deny tcp [other client subnets] [WLC mgmt IP] eq 22 • permit ip any any (otherwise you may lock lot of things out!!!) #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 13 For your reference WLC management authentication / authorization AireOS Local DB: read-only read-write WLC * Tasks are the WLC’s menu tabs. Fail / Success RADIUS + Even when tasks are not explicitly authorized, users have RO access to them. privileges (RO / RW) RO access to a task grants RO access to all the sub-menus. RW access to a task grants RW access to all the sub-menus. Fail / Success + tasks access * Config. examples: TACACS http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wlan-security/71989-manage-wlc-users-radius.html http://www.cisco.com/c/en/us/support/docs/wireless-mobility/wireless-lan-wlan/91631-uwn-tacacs-config.html #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 14 For your reference C9800 management authentication / authorization IOS-XE Local DB: • GUI: read-only / read-write C9800 • CLI: privilege 0-15 RADIUS RO access to the GUI grants access to the Dashboard and Monitoring menus. Fail / Success + RW access to the GUI grants RW access to all menus. Privileges (CLI) Fail / Success + Command AuthZ (CLI) TACACS Read-Only Read-Write #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 15 For your AP management access reference #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 16 AP control at the access layer A few words on 802.1X Layer 2 Point-to-(Multi)Point Layer 3 Link Supplicant EAP over LAN Authenticator RADIUS AuthC Server (EAPoL) EAPoL Start Beginning EAPoL Request Identity EAP-Response Identity: Printer RADIUS Access Request [AVP: EAP-Response: Printer] EAP-Request: EAP-FAST RADIUS Access-Challenge Middle [AVP: EAP-Request EAP-FAST] Multiple EAP-Response: EAP-FAST Challenge- RADIUS Access Request Request [AVP: EAP-Response: EAP-FAST] Exchanges Possible RADIUS Access-Accept EAP Success End [AVP: EAP Success] [AVP: VLAN 10, dACL-n] #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 17 AP control at the access layer 802.1X credentials for the AP * Access Point (AP) Layer 2 Point-to-(Multi)Point Layer 3 Link Supplicant EAP over LAN Authenticator RADIUS AuthC Server (EAPoL) AP# capwap ap dot1x username [USER] password [PWD] * AireOS 8.6 for 802.11ac Wave 2 APs (EAP-FAST MS-CHAPv2 as for other AP series) AireOS 8.7+ for EAP-TLS or PEAP MS-CHAPv2 support (802.11ac Wave 2 APs and later) AireOS #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 18 AP control at the access layer 802.1X credentials for the AP * Access Point (AP) Layer 2 Point-to-(Multi)Point Layer 3 Link Supplicant EAP over LAN Authenticator RADIUS AuthC Server (EAPoL) AP# capwap ap dot1x username [USER] password [PWD] * AireOS 8.6 for 802.11ac Wave 2 APs (EAP-FAST MS-CHAPv2 as for other AP series) AireOS 8.7+ for EAP-TLS or PEAP MS-CHAPv2 support (802.11ac Wave 2 APs and later) IOS-XE #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 19 AP control at the access layer The FlexConnect challenge Layer 2 Point-to-(Multi)Point Layer 3 Link Supplicant EAP over LAN Authenticator RADIUS AuthC Server (EAPoL) FlexConnect AP 802.1X (usually) “needs” a trunk port. needs an access port. interface GigabitEthernet1/0/1 switchport access vlan 100 switchport mode access authentication port-control auto dot1x pae authenticator ... #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 20 AP control at the access layer The FlexConnect challenge Layer 2 Point-to-(Multi)Point Layer 3 Link Supplicant EAP over LAN Authenticator RADIUS AuthC Server (EAPoL) “What do you think?” “Here I am.” “Accept. Here is the interface template *” cisco-av-pair=interface-template-name=FLEXCONNECT_AP_TRUNK_TEMPLATE template FLEXCONNECT_AP_TRUNK_TEMPLATE switchport trunk native vlan 100 switchport trunk allowed vlan 100,110,120,130 switchport mode trunk * IOS 15.2(2)E+ spanning-tree portfast trunk #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 21 BRKEWN-2010 Securing the AP-WLC communication BRKEWN-2670 CAPWAP tunnels DTLS, UDP 5246 CAPWAP Control CAPWAP Data (DTLS) UDP 5247 config ap link-encryption enable all/[AP-NAME] AireOS IOS-XE #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 22 Securing the AP-WLC communication Manufacturer Installed Certificate (MIC) DTLS, UDP 5246 CAPWAP Control CAPWAP Data (DTLS) UDP 5247 #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 23 Securing the AP-WLC communication Local Significant Certificate (LSC) - AireOS Your PKI CAPWAP Example: http://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/110141-loc-sig-cert.html #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 24 Secure Isolation with Guest Anchor Guest Tunnel Firewall Enterprise Users CAPWAP Internet Wireless LAN Controller DMZ or Anchor Wireless Guests LAN Controller #CLUS BRKEWN-2005 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Public 25 Securing the AP-WLC communication Local Significant Certificate (LSC) – IOS-XE ap lsc-provision ! In Non-WLANCC mode APs will be provisioning with RSA certificates with specified key-size configuration. In WLANCC mode APs ! will be provisioning with EC certificates with a 384 bit key by-default or 256 bit key if configured.