The Two Variations of NAC - University System of Maryland

Managing and Securing Wireless
Networks with Cisco Clean Access
Steve Coppel
SE, Maryland Enterprise
CISSP, CCSP
© 2004 Cisco Systems, Inc. All rights reserved.
1
Agenda
• WLAN Security Issues
• WLAN Enterprise Issues
• Requirements for WLAN
Management & Security Solution
• Cisco Clean Access Solution
• Case Study: Stanford University
© 2004 Cisco Systems, Inc. All rights reserved.
2
WLAN Security Issues - A Different IT Beast
• Non-existent or Porous Boundaries
▪ More vulnerable to a variety of malicious attacks
▪ WEP security inadequate
▪ Many common areas where anyone can access a wireless
signal
• Security Challenge Shifted from Ports to Users
▪ Authentication more important but also more difficult
▪ Increase susceptibility to attacks originating from
employees’ home networks
• Wireless and Wireline Management Integration
Unresolved
▪ Management is enormous challenge
▪ Impacts usability and productivity
© 2004 Cisco Systems, Inc. All rights reserved.
3
WLAN Security Issues
• MAC and IP Spoofing Too Easy
▪ Multitude of free tools on Internet allow machines to spoof
other MAC and IP addresses
• Denial of Service (DoS) Attacks Too Easy
▪ Several DoS attacks possible including consuming all IP
addresses, DoS attacks on web servers, file servers, mail
servers, etc.
• “Man in the middle” Attack
▪ Malicious users find it easy to insert themselves in
communication path in order to steal user credentials,
session, etc.
© 2004 Cisco Systems, Inc. All rights reserved.
4
WLAN Enterprise Issues
Issue
Tools
If Left Unresolved
Multi-vendor Access
Point Management
Management software
provided by each access
point vendor but is not
interoperable with others
Heterogeneous
environments are
impossible to manage
centrally
Integrated Management
between Wired and
Wireless Networks
None
Management and user
interface complexity
increases
Viruses Imported from
External Networks
Point Products
Viruses may frequently
and severely impact
enterprise productivity
Management Difficulties
Associated with VPNs –
over-WLANs
Vendor-specific
solutions; most VPNs
built for dial-up use
Security gaps may
remain; client
maintenance complexity
increases
© 2004 Cisco Systems, Inc. All rights reserved.
5
Requirements for WLAN Management & Security
Solution
• Authentication-based Access to WLAN
▪ Users must be authenticated before provided network access
▪ Authentication must be performed using existing
authentication systems
▪ Un-authentication users (rogue users) must not be allowed to
launch DoS attacks (e.g. ping attacks, etc.)
• Client-less Deployment Mandatory
▪ Security solution should not mandate the deployment of any
client software
▪ Optional client software for ease of use, additional security,
network sniffing, rogue access point reporting, war driving, etc.
preferred
© 2004 Cisco Systems, Inc. All rights reserved.
6
Requirements for WLAN Management & Security
Solution
• Strong Data Protection
▪ Standards-based, strong, over-the-encryption is needed
of WEP or any proprietary mechanism
• Non-Proprietary Hardware Preferred
▪ Preferred that security solution not require proprietary
hardware
▪ Easily scalable hardware
© 2004 Cisco Systems, Inc. All rights reserved.
7
Requirements for WLAN Management & Security
Solution
• Centralized Deployment
▪ Security and management solution must both be
deployable centrally in the network centers
▪ Edge deployments are too expensive to deploy/manage
• Centralized Configuration & Management
▪ Ability to configure and manage entire deployment from a
central location
▪ Secure remote management
© 2004 Cisco Systems, Inc. All rights reserved.
8
Cisco Clean
Access Solution
© 2003
2004 Cisco Systems, Inc. All rights reserved.
9
What Does Clean Access Do?
Before allowing users onto the network, whether it’s
a wired or wireless network, Clean Access:
RECOGNIZES
ENFORCES
Recognizes:
Users, device, and role
(guest, employee, contractor)
Evaluates:
Identify vulnerabilities on
devices
Enforces:
Eliminate vulnerabilities
before network access
EVALUATES
© 2004 Cisco Systems, Inc. All rights reserved.
10
Key Cisco Clean Access Features
All-in-One Policy Compliance and Remediation Solution
• Role-based access control
Cisco Clean Access server
enforces authorization policies
and privileges
Supports multiple user roles
(e.g. guests, employees, and
contractors)
• Scans for security
requirements
Agent scan for required
versions of hotfixes, AV, and
other software
• Network quarantine
Isolate non-compliant machines
from rest of network
MAC and IP-based quarantine
effective at a per-user level
• Repair and update
Network-based tools for
vulnerability and threat
remediation
Help-desk integration
Network scan for virus and
worm infections
Network scan for port
vulnerabilities
© 2004 Cisco Systems, Inc. All rights reserved.
11
Cisco Clean Access Components
• Cisco Clean Access Server
Formerly CleanMachines SmartServer
Serves as an inline or out-of-band device for
network access control
• Cisco Clean Access Manager
Formerly CleanMachines SmartManager
Centralizes management for administrators,
support personnel, and operators
• Cisco Clean Access Agent
Formerly CleanMachines SmartEnforcer
Optional client for device-based registry scans
in unmanaged environments
© 2004 Cisco Systems, Inc. All rights reserved.
12
Pre-Configured Clean Access Checks
Critical Windows Update
McAfee
Windows XP, Windows 2000, Windows 98,
Windows ME
Symantec
Norton AntiVirus 2005 v. 11.0.x
Norton AntiVirus 2004 v. 10.x
Norton AntiVirus 2004 Professional v. 10.x
Norton Internet Security 2004
Norton AntiVirus 2003 v. 9.x
Norton AntiVirus 2003 Professional v. 9.x
Norton AntiVirus 2002 Professional v. 8.x
Norton AntiVirus Corporate Edition v. 7.x
Symantec Internet Security 2005 Edition 8.0.x
Symantec AntiVirus Scan Engine Edition 8.0.x
Symantec AntiVirus Corporate Edition v. 9.x
Symantec AntiVirus Corporate Edition v. 8.x
Sophos
McAfee VirusScan Enterprise v. 8.0i beta
McAfee VirusScan Enterprise Edition v. 7.5
McAfee VirusScan Enterprise Edition v. 7.1
McAfee VirusScan Enterprise Edition v. 7.0
McAfee VirusScan Enterprise Edition v. 4.5.x
McAfee VirusScan Professional Edition v. 8.0.x
McAfee VirusScan Professional Edition v. 7.x
McAfee VirusScan ASaP
Trend Micro
Trend Micro Internet Security v. 12.x
Trend Micro Internet Security v. 11.2
Trend Micro Internet Security v. 11.0
Trend Micro OfficeScan Corporate Edition v. 6.x
Trend Micro OfficeScan Corporate Edition v. 5.x
Trend Micro PC-Cillin 2004
Trend Micro PC-Cillin 2003
Cisco Systems
Sophos Anti-Virus Enterprise v. 3.x
Cisco Security Agent v. 4.x
Customers can easily add custom checks
© 2004 Cisco Systems, Inc. All rights reserved.
13
Pre-Configured Checks (cont’d)
Computer Associates (eTrust)
Computer Associates eTrust Antivirus v. 7.x
Computer Associates eTrust EZ Antivirus v. 6.2.x
Computer Associates eTrust EZ Antivirus v. 6.1.x
F-Secure
F-Secure Anti-Virus for Workstations TBYB 5.x
F-Secure Anti-Virus Client Security 5.x
F-Secure Anti-Virus 2004 5.x
Panda
Panda Titanium Anti-Virus 2004 v. 3.x
Panda Anti-Virus Platinum v. 7.x
Panda Anti-Virus Platinum v. 6.x
Panda Internet Security Platinum v. 8.x
Panda Anti-Virus Light v. 1.9x
Kaspersky
SOFTWIN (BitDefender)
BitDefender Free Edition v. 7.x
BitDefender Standard/Professional Edition 7.x
BitDefender Standard v. 8.0.x
BitDefender Professional Plus v. 8.0.x
Grisoft (AVG)
AVG Antivirus v. 7.0
AVG Antivirus v. 6.0
AVG Antivirus v. 6.0 Free Edition
Frisk Software International
F-Prot Antivirus v. 3.x
SalD
DrWeb Antivirus v. 4.31b
Eset
Kaspersky Anti-Virus Personal v. 5.x
Kaspersky Anti-Virus Personal v. 4.x
Kaspersky Anti-Virus Personal Pro v. 4.x
Authentium
NOD32 Antivirus system NT/2000/2003/XP 2.0
Zone Labs
ZoneAlarm with Antivirus v. 5.x
Authentium Command Anti-Virus Enterprise 4.x
© 2004 Cisco Systems, Inc. All rights reserved.
14
Cisco Clean Access System Operation
THE GOAL
1. End User Attempts to Access a Web
Page or Uses an Optional Client
• Network access is blocked until end
user provides login information
Authentication
Server
Cisco Clean
Access Manager
2. User Is
Redirected to a Login Page
Cisco Clean
Access Server
• Clean Access validates
username and password;
also performs device and
network scans to assess
vulnerabilities on the device
3a. Device Is Non-Compliant
or Login Is Incorrect
• User is denied access and assigned
to a quarantine role with access to
online remediation resources
© 2004 Cisco Systems, Inc. All rights reserved.
Intranet/
Network
3b. Device Is “Clean”
Quarantine
Role
• Machine gets on “clean
list” and is granted
access to network
15
Sample Reporting
Login
Screen
4.
© 2004 Cisco Systems, Inc. All rights reserved.
16
Multiple Deployment Options
Out-of-band:
For high throughput environments for
deployment in
• Campus Environments
• Branch Offices
• Extranet environments
• Highly routed environments
Inline:
Supports environments
including
• Wireless
• Hubs
• Shared Media
© 2004 Cisco Systems, Inc. All rights reserved.
17
CCA Inline Deployment
FEATURES:
• VLAN trunking support
• ~1 GB/sec throughput support
• Failover support
Border
Router
Intranet
Firewall
Clean Access
Server
Bridged Central
Deployment
Switch
Clean
Access
Server
Routed Central
Deployment
Switch
Core
Clean Access
Server
Edge Deployment
© 2004 Cisco Systems, Inc. All rights reserved.
Clean Access
Manager
Authentication
Server
18
Secure Remote Access Deployment
Secure Remote:
Supports environments
with remote users coming
through VPN
Concentrators
© 2004 Cisco Systems, Inc. All rights reserved.
19
CCA Out Of Band Deployment
Internet
Integrates with Cisco switches to
provide out of band solution.
Clean Access
Manager
Firewall
Router
Clean Access
Server
Provides network access control
for LAN users.
Deployed in highly routed networks
and environments where in-line
appliance is not appropriate.
End User
© 2004 Cisco Systems, Inc. All rights reserved.
20
CCA: User Access, Non-certified Machine
7
1
Network


6
3
Switch
Host with
CCA Agent
2
4
5
CCA Manager

CCA Server
1
End user attaches host to network
2
Switch sends MAC address via SNMP-based alert to CCA Manager
3
CCA Manager decides whether host has been previously certified
4
If NO, CCA Manager instructs switch to put device on quarantine VLAN.
CCA Server acts as a gateway or bridge for the quarantine VLAN
CCA Server intercepts device request
Performs posture assessment and remediation
5
CCA Server certifies MAC address and forwards to CCA Manager
6
CCA Manager instructs switch to change to the appropriate VLAN
7
Host is granted access to network
© 2004 Cisco Systems, Inc. All rights reserved.
21
End User Experience: with Agent
Login
Screen
User Authentication
User Machine Quarantined
Remediation Steps
4.
© 2004 Cisco Systems, Inc. All rights reserved.
22
End User Experience: with Agent
Login
Screen
Scan is performed
(types of checks depend on user role)
Scan fails
Remediate
4.
© 2004 Cisco Systems, Inc. All rights reserved.
23
End User Experience: Web-based
Login
Screen
Scan is performed
(types of checks depend on user role/OS)
Click-through remediation
© 2004 Cisco Systems, Inc. All rights reserved.
24
Cisco Clean Access: The Holistic Solution
Products
WLAN
Security
WLAN
Management
Clean Access
Authentication
√
√
Encryption
√
√
User/Group Policy
Management
√
√
Firewall
√
√
Roaming Support
√
√
AP Configuration &
Management
√
√
Remote Client
Updates
√
√
Centralized WLAN
Management
√
√
√
√
WLAN Monitoring &
Reporting
√
© 2004 Cisco Systems, Inc. All rights reserved.
25
Case Study:
Stanford University
© 2003
2004 Cisco Systems, Inc. All rights reserved.
26
Stanford University – Authentication & Ease of Use
• Challenge
Improve Authentication
Keep it simple
Interoperate with existing system
• Solution
Clean Access protects each subnet
Authentication through Kerberos
Centralized Deployment (edge-based
optional)
• Benefits
Short implementation
Rapid ROI
Wireless expanding into business
school & medical center
© 2004 Cisco Systems, Inc. All rights reserved.
27
Stanford University WLAN Deployment
• Huge Campus
▪ Large student, faculty, and staff community
▪ More than 8200 acres
▪ More than 675 large buildings
• Wireless Computing Growing in Popularity
▪ Wireless laptops mandatory in certain schools
▪ Lower cost of Wireless access cards
• Deployment
▪ More than 250 access points throughout common areas
and many buildings
▪ Divided into 4 major network segments
© 2004 Cisco Systems, Inc. All rights reserved.
28
Stanford University WLAN Deployment Security
• Security for Initial Deployment
▪ Minimal
▪ Based on MAC address of access card – SU maintains
database of registered MAC addresses (NetDB) and only
registered network cards are provided IP addresses
▪ No WEP – Preferable to providing user with false sense of
security
▪ Susceptible to several different types of attacks
© 2004 Cisco Systems, Inc. All rights reserved.
29
Q&A
© 2003
2004 Cisco Systems, Inc. All rights reserved.
30
© 2004 Cisco Systems, Inc. All rights reserved.
31