Design Approaches to Secure Wireless within UK Government May 2014 Design Approaches to Secure Wireless within UK Government 1 Legal Disclaimer This proposal is being provided by Cisco International Limited. As a developer and manufacturer of leading edge communications products and software, Cisco does not generally undertake direct business in Europe. As a result, the response that we are providing to you is not an offer of sale or otherwise, but simply an information pack to enable you to make an initial evaluation of the Cisco product offerings. Where provided, compliance statements are made to assist in your evaluation, but these do not, and will not in the future, comprise part of any offer capable of acceptance. Any information concerning pricing and rates is purely indicative. If your initial evaluation favours a solution based on the Cisco products, we will assist you in identifying a Cisco accredited systems integrator of your choice from a number of well-established companies in the UK and you will be free to negotiate commercial and contractual terms with one or more of those integrators. As part of the same process, you should have any Cisco compliance statements verified or modified by the integrator based on the design proposed by the integrator. The Cisco logos, trademarks and other information provided by Cisco appear in this response with Cisco’s permission and are proprietary and confidential information of Cisco Systems, Inc. 1 1.1 1.2 EXECUTIVE SUMMARY......................................................................................................................4 Introduction .......................................................................................................................................4 1.1.1 Executive Summar.y........................................................................................................4 Proposed Solution............................................................................................................................6 1.2.1 Secure Wireless LAN Background – Manual Y...............................................................6 1.2.2 Current Secure Wireless LAN Guidance – AP12............................................................6 1.2.3 Main Differentiators - Manual Y and AP12.....................................................................7 1.2.4 Cisco Approach for Secure Wireless LAN......................................................................7 2 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 2.10 ARCHITECTURAL OVERVIEW ...........................................................................................................9 Model 1 – AP12 Local/Cloud Managed Wireless LAN..................................................................10 2.1.1 Model 1a – AP12 Local Wireless LAN Controller..........................................................10 2.1.2 Model 1b – AP12 Cisco Cloud Based Wireless LAN....................................................11 Model 2 – AP12 Centralised Wireless LAN Controller..................................................................13 Model 3 – Wireless LAN for IL2 PSN Connection..........................................................................15 2.3.1 Deviation from AP12 Guidance.....................................................................................16 Model 4 – IL3 Based Wireless LAN Approach...............................................................................17 2.4.1 Model 4a – IL3 Based WLAN........................................................................................17 2.4.2 Enhanced Wireless Security.........................................................................................18 2.4.3 Cisco ISE Benefits........................................................................................................19 2.4.4 Mobile Device Management Support.......................................................................... 21 2.4.5 Deviation from AP12 Guidance.................................................................................... 21 2.4.6 Model 4b – Addition of VPN IPsec Overlay.................................................................. 22 Architecture Management............................................................................................................. 23 Architecture Sample Kit List.......................................................................................................... 24 Model Comparison......................................................................................................................... 25 General Wireless Design Considerations..................................................................................... 29 2.8.1 Points for Consideration.............................................................................................. 29 Architecture Enhancements.......................................................................................................... 31 2.9.1 Enhancements to the Service...................................................................................... 31 Guest User Experience................................................................................................................... 31 2.10.1 Guest User Experience................................................................................................ 31 3 CISCO DIFFERENTIATORS ....................................................................................................................... 33 3.1 Cisco Differentiators...................................................................................................................... 34 4 APPENDIX ................................................................................................................................................. 37 4.1.1 Cisco Key Wireless LAN Key Technology Areas.......................................................... 38 4.1.2 Cisco Cloud Managed Wireless LAN........................................................................... 38 4.1.3 Cisco WLAN Controllers.............................................................................................. 38 4.2 Cisco Wireless Network Management......................................................................................... 39 4.3 Cisco Mobility Services Engine (MSE).......................................................................................... 39 4.4 Cisco Identity Services Engine (ISE)............................................................................................. 39 4.4.1 Cisco ISE Appliances................................................................................................... 39 4.4.2 Cisco Secure Network Server..................................................................................... 39 4.4.3 Cisco ISE Licensing..................................................................................................... 39 Figure 1 - AP12 Local WLC...........................................................................................................................10 Figure 2 - AP12 Cloud Managed...................................................................................................................11 Figure 3 – AP12 Central WLC.........................................................................................................................13 Figure 4 – IL2 Based Connectivity..................................................................................................................15 Figure 5 - IL3 Based Connectivity..................................................................................................................17 Figure 6 - IL3 Based Connectivity with VPN Client........................................................................................22 Design Approaches to Secure Wireless within UK Government 3 1. Executive Summary 1.1Introduction 1.1.1 Executive Summary Wireless LAN coverage is an ever-increasing necessity of the modern workplace, especially as mobile technologies such as smartphones and tablets become commonplace at work. A large percentage of these devices don’t have the capability for a wired Ethernet and therefore rely on the presence of a wireless infrastructure to operate successfully. Some of the latest laptops released don’t include a wired Ethernet port by default, so there’s a clear emphasis in the industry to steer towards a wireless environment. With the ever increasing capability of mobile devices, together with continual increase in wireless throughput (one Gbps wireless LAN throughput is a reality today); there’s a clear need for a comprehensive and robust wireless deployment strategy in all public and private sector organisations. 4 Design Approaches to Secure Wireless within UK Government Users are no longer fixed to desks with a single desktop PC for connection to the network - instead it’s more common to see users with a multitude of devices, each with different levels of network access. This can range from full corporate access for the company-issued laptop or smart devices, or limited access for the BYOD devices. Equally, services are no longer restricted to a particular device or even IP subnet, such as traditional data and voice devices. Multiple services can easily be established from a single end user device: a smartphone has the capability to make phone calls, share video data calls, whilst sharing and checking emails, as an example. It’s therefore imperative that “A wireless LAN solution that allows flexibility, mobility, security, visibility and control will be fundamental to achieving this working environment.” the wireless service that carries this information has the ability to distinguish between these differing streams of data, so that any Quality of Service may be applied. This not only ensures business critical applications are guaranteed as they traverse the network, but also ensures that non-business critical applications can be dropped if necessary. To realise these benefits, this document outlines the possible approaches of a Cisco wireless LAN infrastructure that could be deployed within a secure environment. A typical example of which could be UK Central UK Government Departments where the network may be accredited to carry classified data with the need to apply additional technical controls to protect sensitive data. A wireless LAN solution that allows flexibility, mobility, security, visibility and control will be fundamental to achieving this working environment. Design Approaches to Secure Wireless within UK Government 5 “Fundamentally Cisco’s wireless solution is based around a centralised deployment model that uses a wireless controller concept providing a single point of administration and traffic egress for all connected access points.” 1.2 Proposed Solution The proposed solutions within this document are primarily aimed at satisfying wireless LAN solutions for UK Central Government departments, that will ultimately be connected and form part of the shared Public Services Network (PSN). As such, there may also be a relevance to distributed Government departments, such as local councils, where a PSN based WAN and / or LAN is present. 1.2.1 Secure Wireless LAN Background – Manual Y CESG Infosec Manual Y, Use of WPA2 Unevaluated Wireless Technology in Government Systems, was a paper published by CESG that provided guidelines on deploying Wireless LAN for use in networks classified to RESTRICTED. It was recommended that any UK Government body planning to implement a Wireless LAN to deliver RESTRICTED data or voice services should consider the guidance within Manual Y from CESG. The accreditation process involved engaging either CESG directly, or a suitably trained CLAS consultant. First a high level design needed to be produced, reviewed by the CLAS consultant and approved in principle. Secondly, the solution needed to be implemented and ultimately signed off by the department’s accreditor. The accreditor may require a penetration test. All the 6 Design Approaches to Secure Wireless within UK Government above activity needed to be budgeted for as part of the project. Manual Y called for a secure, standards based Wireless LAN using 802.11i certificate based authentication and encryption methods that leverages a PKI infrastructure. Additional measures are required to protect the Authentication servers, the Certificate Authority and to lock down the client. By using Layer 2 security a Manual V or CAPS VPN is not required. 1.2.2 Current Secure Wireless LAN Guidance – AP12 In February 2013, first issue Version One of Architectural Pattern 12 (AP12) was released and it replaces CESG Infosec Manual Y, Use of WPA2 Unevaluated Wireless Technology in Government Systems. AP12 proposes a number of architectures aimed at managing the security risks of wireless LAN networking. The AP12 document provides guidance rather than a mandatory policy, however to conform to AP12, all the ‘must’ statements within the document need to be followed. When implementing a solution to AP12, strict adherence to the controls contained within it does not automatically result in a secure solution - this remains the role of the accreditor, in collaboration with the systems integrator to ensure that the solution implemented is appropriate to the context within which it is deployed. AP12 requires the managed endpoint to use a Virtual Private Network (VPN) solution, such as Cisco AnyConnect Secure Mobility Client to encrypt traffic between the managed wireless endpoint and the enterprise VPN gateway, thus ensuring the confidentiality and integrity of data in transit over the wireless network is protected. 1.2.3 Main Differentiators - Manual Y and AP12 The main differentiation between Manual Y and AP12 is the level of trust associated with the underlying wireless infrastructure. Manual Y was based on the use of embedded capabilities within the wireless infrastructure to provide confidentiality and integrity to the client’s traffic. Furthermore the wireless network infrastructure devices were physically connected to the main departmental LAN offering a truly integrated wired and wireless service to users. AP12 on the other hand sees the introduction of a completely separate physical network infrastructure, dedicated to wireless LAN with the requirement that a corporate managed endpoint utilises an IPsec VPN to provide traffic confidentiality and integrity protection – in essence the wireless infrastructure is viewed as untrusted. Following the AP12 guidance provides no direct connection to the local departmental LAN but instead a connection is only achieved through the IPsec VPN tunnel. 1.2.4 Cisco Approach for Secure Wireless LAN There are many approaches and methods that could be adopted to satisfy the guidance outlined in CESG AP12 and will ultimately be subject to the individual customer’s business needs, the traffic profile and security requirements. Fundamentally our wireless solution is based around a centralised deployment model that uses a wireless controller concept providing a single point of administration and traffic egress for all connected access points. This model contrasts with an autonomous architecture whereby each access point becomes a managed endpoint and traffic egress is distributed. LAN and traverse the IL2 PSN WAN backbone to centralised IL2 resources. Importantly, an assumption has been made that the guest wireless infrastructure will remain separate and isolated from the corporate wireless infrastructure. The final approach will propose what is considered good practice and will steer away from the AP12 guidance, although a wide range of security controls will be considered delivering the necessary protection of traffic confidentiality and provide a high degree of access control security. This approach will see the wireless infrastructure form an integrated part of the secure environment and a model that shares many of the traits from the older Manual Y guidance. Importantly, this approach keeps the guest wireless infrastructure separate, and for the purposes of this document, it is assumed for this final approach that the guest infrastructure is via a separate dedicated infrastructure, although this again may be subject to individual customer requirements. Guest and Corporate infrastructures in this instance will be separate and isolated. A customer may wish to choose any or none of these approaches in-order to satisfy their wireless LAN requirements, and we have the breadth of portfolio and expertise to ensure that an appropriate solution can be investigated. Irrespective of solution proposed, in each case any connection that involves the use of an unmanaged wireless device connecting to a managed wireless LAN infrastructure will utilise dedicated wireless infrastructure on an isolated LAN segment. This would be applicable to guest users devices or contractor users devices, as an example and follows the principles of the unmanaged devices guidance published by the Cabinet Office PSN team and subsequently forms CESG Architectural Pattern 7 (AP7). This document will suggest four approaches that may be considered. The first two approaches follow the principles of AP12, including the provision of a separate dedicated wireless infrastructure with either local wireless controllers or central wireless controllers, of which the latter assumes deployment in a multi-site environment. The third approach introduces a variation on this theme and introduces some of the principles of a commercial good practice deployment of wireless technology, whereby the wireless infrastructure devices are connected directly to the Design Approaches to Secure Wireless within UK Government 7 8 Design Approaches to Secure Wireless within UK Government 2. Architectural Overview Proposal for Government Design Approaches Departments to Secure / CiscoWireless Secure Wireless within UKLAN Government Proposal 9 2. Architectural Overview 2.1 Model 1 – AP12 Local/Cloud Managed Wireless LAN With reference to CESG document Architectural Pattern 12 (AP12), this approach is a combination of Scenario’s one and three and where this guidance is followed, is considered to be the most likely deployment method for small and simple use cases. 2.1.1Model 1a – AP12 Local Wireless LAN Controller Figure 1 - AP12 Local WLC IL3 Resources IL2 Resources Trusted Corporate resources Customer Data Centre DMZ VPN Concentrator IL3 LAN MDM IL2 PSN WAN PSN CE Router Prime Infrastructure MSE WAN Internet Local WLC Customer Site IL0 Guest LAN IL2 LAN Client based VPN Encrypted Tunnel direct VPN Concentrator (n) x AP Corporate Managed Client The above model is based on a multi-site network and assumes that the VPN termination point is located centrally in the data centre. Following this assumption, this approach considers that there will be a dedicated wireless LAN infrastructure within a site consisting of wireless access points and a local wireless controller. This will be connected to a dedicated and physically segmented network that will have a direct Internet connection over which all wireless traffic will be transported. Design Approaches to Secure Wireless within UK Government Guest Traffic direct to internet Advertised wireless LAN SSID Any Connect VPN Client 10 MSE ISE Boundary Firewall PSN CE Router IL3 Overlay Optional Management, Security and Location Guest Client All of this infrastructure will be isolated from any accredited networks that carry protectively marked traffic or traffic designated higher than IL0. The wireless LAN network SSID will be advertised and both corporate and guest users may associate to it with all traffic being routed either directly to the Internet (guest traffic) or to the VPN concentrator hosted in the central data centre (corporate traffic). For a corporate device, subject to the clients’ local security requirements, an IPsec VPN client will be required to secure the session between the device and the trusted network. All traffic between the client and the trusted network will be encapsulated within this IPsec tunnel, which is independent of the wireless LAN infrastructure. Once the secure tunnel has been established, this will allow the user access to departmental resources as determined by local security policies. For guest and/or contractor users, clients will associate to the advertised open SSID, but upon launching their internet browser, they will be redirected to a captive portal hosted on the wireless controller, where they will be challenged to authenticate with a username and password. Once entered, they will then be given access to the local LAN and provided direct access to the Internet. 2.1.2Model 1b – AP12 Cisco Cloud Based Wireless LAN As an alternative to previous example, this Model 1b is along similar lines to Model 1a, with the exception that in this instance, the use of the Cisco Cloud based Wireless LAN (Meraki) solution is considered. This may not be suitable to all departments, as the management traffic (not data) will be sent to the Cisco public cloud and therefore careful consideration should be taken over the additional risks this model may introduce. 2.1.2 Model 1b – AP12 Cisco Cloud Based Wireless LAN Figure 2 - AP12 Cloud Managed IL3 Resources IL2 Resources Customer Data Centre IL2 PSN WAN PSN CE Router IL3 LAN VPN Concentrator Internet PSN CE Router IL3 Overlay Trusted Corporate resources Cisco Cloud based Network (Meraki) WAN Internet Access Point Management Customer Site based management IL0 LAN IL2 LAN Client based VPN Encrypted Tunnel direct to VPN Concentrator via AP & Local Internet Advertised wireless LAN SSID Any Connect VPN Client Corporate Managed Client Guest Client Design Approaches to Secure Wireless within UK Government 11 The above model is based on a multi-site network and assumes that the VPN termination point is located centrally in the data centre. Following this assumption, this approach considers that there will be a dedicated wireless LAN infrastructure within a site consisting of Cisco cloud based wireless access points. This will be connected to a dedicated and physically segmented network that will have a direct Internet connection over which all wireless traffic will be transported. All of this infrastructure will be isolated from any accredited networks that carry protectively marked traffic or traffic designated higher than IL0. The wireless LAN network SSID will be advertised and both corporate and guest users may associate to it with all traffic being routed either directly to the Internet (guest traffic) or to the VPN concentrator hosted in the central data centre (corporate traffic). For a corporate device, subject to the clients’ local security requirements, an IPsec VPN client will be required to secure the session between the device and the trusted network. All traffic between the client and the trusted network will be encapsulated within this IPsec tunnel, which is independent of the wireless LAN infrastructure. Once the secure tunnel has been established, this will allow the user access to departmental resources as determined by local security policies. 12 Design Approaches to Secure Wireless within UK Government For guest and/or contractor users, clients will associate to the advertised open SSID, but upon launching their internet browser, they will be redirected to a captive portal hosted within the Cisco Cloud wireless LAN service, where they will be challenged to authenticate with a username and password. Once entered, they will then be given access to the local LAN and provided direct access to the Internet. All wireless LAN management will be performed from the Cloud based solution, No client based user goes via the cloud, as all user traffic will be dropped onto the local network. Access to the deployed wireless LAN access points can be achieved via the department’s internet connection, where an SSL connection to the web GUI for their deployment of Cisco Cloud based access points can be managed, or setting up of guest accounts. Additionally, from here, rules could be setup to prevent certain traffic types, such as Netflix, for example, if these are seen as nonbusiness critical. 2.2 Model 2 – AP12 Centralised Wireless LAN Controller This second approach is again produced in line with scenarios one and three from within the CESG AP12 document and is considered to be the most likely deployment method for larger and more distributed deployments or where an element of central control and visibility may be needed for guest users. 2.2 Model 2a – AP12 Centralised Wireless LAN Controller Figure 3 - AP12 Central WLC Customer Data Centre IL3 Resources DMZ Trusted Corporate Optional Management, Security and Location resources IL2 Resources MSE ISE VPN Concentrator Boundary Firewall PSN CE router IL3 Overlay IL2 PSN WAN PSN CE router IL3 LAN MDM IL2 LAN IL0 Guest LAN Guest Traffic direct to internet via CAPWAP tunnel Any Connect VPN Client As above, this second approach is based upon the assumption that most customers’ VPN concentrator solutions will be located in the data centre and therefore in order to meet the requirements set out in AP12, a dedicated, physically isolated infrastructure consisting of wireless LAN access points, LAN switches and a WAN router must be deployed in the branch locations where wireless connectivity is required. An additional Internet WAN / DSL circuit will then be required to connect this dedicated infrastructure to an Internet DMZ located within the data centre. All wireless LAN traffic from the branch site will then be tunnelled, via a CAPWAP tunnel from the access Internet CAPWAP DTLS tunnel for all Access Point Data Traffic Client based VPN Encrypted Tunnel direct to VPN Concentrator via AP CAPWAP tunnel Corporate Managed Client MSE WLC(s) WAN / Internet Customer Site Prime Infrastructure Advertised wireless LAN SSID Guest Client points and terminated on a wireless controller located within the DMZ. At this point, departmental traffic will be able to reach the Internet facing interface of the VPN concentrator, whilst guest users will be provided with direct Internet connectivity. All of the wireless infrastructure equipment would be physically separated from the existing accredited departmental network and a dedicated WAN or Internet connection should be provisioned to carry wireless client traffic to the centralised wireless LAN controllers. Design Approaches to Secure Wireless within UK Government 13 As with the first deployment model, the wireless LAN network SSID will be advertised on the branch site whereby corporate users and guests may associate to it. All traffic will be terminated centrally before egressing to the Internet or VPN concentrator as necessary for their connection. For a departmental device (if CESG AP12 guidance is followed), an IPsec VPN client will be required to secure the connection between the device and the trusted network. All traffic between the client and the trusted network will be encapsulated within this IPsec tunnel, which is independent of the wireless LAN infrastructure. The VPN session will traverse the local wireless network and pass through the CAPWAP tunnel to the centralised wireless LAN controller where the VPN traffic is then forwarded to the Internet facing interface of the VPN concentrator. Once the secure tunnel has been established with the VPN concentrator, user access to departmental resources will be permitted as determined by departmental security policies. 14 Design Approaches to Secure Wireless within UK Government For guest and/or contractor users, clients will associate to the advertised open SSID, and again, all traffic will be forwarded, via the CAPWAP tunnel to the central wireless controllers in the DMZ where the CAPWAP tunnel will terminate. Upon launching their Internet browser, users will be redirected to a captive portal hosted on the wireless controller where they will be challenged to authenticate with a username and password. Once entered, they will then be permitted access to the central DMZ LAN for direct Internet connection and can either surf the internet or launch their own VPN connection as appropriate. Central filtering of guest traffic can also be provided if required by departmental security policy. It should be noted that this scenario also scales more readily than the first approach since the central wireless LAN controllers could be used to terminate CAPWAP tunnels from access points located in multiple branch sites. 2.3 Model 3 – Wireless LAN for IL2 PSN Connection This third approach steers away from the guidance of AP12 and instead adopts some of the key principles that may be familiar from the delivery of a Manual Y based solution. 2.3 Model 3a – Wireless LAN for IL2 PSN Connection Figure 4 – IL2 Based Connectivity Customer Data Centre IL2 Resources ISE DMZ Prime Infrastructure MDM ISE MSE MSE Internet Corporate WLC(s) IL3 Resources DHCP AD CA OCSP Guest WLC(s) Boundary Firewall CAPWAP DTLS tunnel for all Access Point Data Traffic PSN CE router IL3 Overlay IL2 PSN WAN IL0 WAN Note - Guest access is optional and customer dependant. Approaches may vary dependant upon customer requirements PSN CE router CAPWAP DTLS tunnel for all Access Point Data Traffic via IL0 WAN Customer Site IL2 LAN IL3 LAN CAPWAP with DTLS tunnel for all corporate traffic to IL2 resources Guest traffic direct to internet via AP CAPWAP tunnel ‘Corp’ SSID 802.1x WPA2-AES EAP-TLS Corporate Managed Client In the previous approaches, dedicated WAN and LAN infrastructure would be deployed in each location where WLAN connectivity is required. Depending on the scale of the wireless coverage required, this could result in significant additional investment in parallel infrastructure. This third approach considers these cost implications and proposes that existing network infrastructure is utilised to transport departmental traffic only, with a separate, more limited infrastructure that could be deployed in selective areas for guest wireless coverage. Transporting guest traffic over an existing accredited IL2 or IL3 infrastructure without any assured cryptographic separation is likely to represent too great a risk to most clients and so this IL0 LAN ‘Guest’ SSID Open Corporate Managed Client scenario assumes the underlying transport network for guest traffic remains on a separate, isolated network infrastructure. This guest infrastructure method may adopt any of the previous examples represented, but will allow the department to choose a more cost effective approach that could be deployed in selective areas. This model approaches the solution from the basis that access is required to IL2 resources, via an IL2 based WAN connection. It is anticipated that this scenario is for IL2 based client activity only and not IL3. This may represent scenarios that may be more pertinent to Local Government clients in particular. Design Approaches to Secure Wireless within UK Government 15 This method proposes that the access points be connected directly to the existing IL2 LAN. Traffic from the access points will be encapsulated within a DTLS encrypted CAPWAP tunnel which is then terminated on a centralised WLAN controller. This approach has been considered to address the needs of many local government departments who have adopted such a model today. This model is broadly in line with CESG Manual Y and is it is generally considered acceptable to meet the current PSN Code of Connection (CoCo), although it is important to note that Cisco provides no guarantees for CoCo compliance should this approach betaken. It should also be noted that a suitable risk assessment should always be undertaken to determine if such an approach adequately mitigates risks within the target environment. Corporate client authentication and authorisation will be conducted via the use of mutual authentication in the form of EAP-TLS with client / server based digital certificates. Upon completion of the authentication process, WPA2-AES wireless encryption shall be utilised to secure the wireless session and there will be no reliance upon client based VPN to secure the session. In order to manage the increased risk associated with the use of connecting the access points to the trusted environment and not using an assured method of encryption, additional security controls can be deployed through the introduction of the Cisco Identity Services Engine (ISE) located centrally. The ISE device delivers a range of network admission control functions allowing tighter control over the wireless, or wired device type, operating system, patch level and presence of endpoint security software such as anti-virus and personal firewall. The Cisco ISE can also be used to enforce extensive policy rules. These rules can be based on the contextual identity of the user or device and can be applied in a consistent manner across wired, wireless or even VPN connections. Guest and/or contractors will associate to the wireless LAN via a separate dedicated open SSID and all traffic will be forwarded, via a CAPWAP tunnel to a separate, centralized wireless controller in an internet DMZ. On launching their Internet browser, guest users will be redirected to a captive portal page hosted on a guest Cisco ISE platform where they’ll be challenged to authenticate with a username and password. Once entered, they may then be subjected to a series of additional security controls, such as time of day restrictions or the application of network layer access control policies. Guest users are then permitted access to the Internet or launch their own VPN connection as appropriate. Central filtering of guest traffic can also be provided if required by departmental security policy. 16 Design Approaches to Secure Wireless within UK Government It should be noted that like the previous example, this scenario is more readily scalable due to the deployment of a central wireless controller. In addition, this scenario also scales more readily for the guest users when compared to the previous two approaches, since the central Cisco ISE platform could be expanded to support many thousands of guest connections and multiple authentication methods from the branch sites. With a suitably designed topology, both corporate and guest wireless authentication could be achieved with the use of the Cisco ISE platform. 2.3.1 Deviation from AP12 Guidance This model deviates from the guidance within AP12 as it suggests the use of an existing PSN based WAN connection and existing IL2 LAN to both connect access points to and facilitate the transport of corporate wireless LAN traffic. The assumption is that guest wireless LAN traffic will remain upon a separate, isolated network infrastructure. This reduces cost by utilising existing WAN circuits and LAN equipment as it removes the additional burden of managing and maintaining a dedicated WLAN network – although this would be required for guest users but should be of a much lower scale. By adopting a solution that does not rely upon IPsec VPN connectivity at the edge, visibility of the wireless client traffic can be gained and therefore business critical applications, such as Jabber, telepresence or WebEx can be identified by the wireless LAN system, classified and QoS policies properly applied, enhancing the overall user experience. This would also help to ensure that non-business critical applications can also be identified and marked at a lower priority or traffic dropped to ensure the availability of business critical applications. 2.4 Model 4 – IL3 Based Wireless LAN Approach This final deployment model again deviates from AP12 and proposes a solution that represents a commercial good practice approach following a similar line to that defined in the now obsolete CESG Manual Y guidance. Two approaches are presented here. The first model, 4a considers a solution that is very much in line with Manual Y. The second approach, Model 4b, adds to this solution by again introducing an IPsec VPN overlay. 2.4.1 Model 4a – IL3 Based WLAN Figure 5 – IL3 Based Connectivity Customer Data Centre Trusted Corporate resources WLC DHCP AD DMZ CA OCSP ISE Boundary Firewall Internet ISE MSE CAPWAP DTLS tunnel for all Access Point Data Traffic via IL3 overlay Prime Infrastructure WLC(s) MSE PSN CE router IL3 Overlay IL0 WAN IL2 PSN WAN IL0 LAN PSN CE router IL3 LAN Note - Guest access is optional and customer dependant. Approaches may vary dependant upon customer requirements CAPWAP DTLS tunnel for all Access Pont Data Traffic via IL0 WAN Guest traffic direct to internet via AP CAPWAP tunnel ‘Corp’ SSID 802.1x EAP-TLS WPA2-AES Corporate Managed Client Guest SSID Open Customer Site In this model, the wireless access points will be connected directly to the accredited IL3 LAN and the wireless infrastructure will be utilised by trusted corporate users only. A corporate client will associate to an advertised SSID and will then perform an 802.1x authentication session with the RADIUS function of Cisco ISE server. The client will perform mutual authentication using EAP-TLS, with digital certificates issued by a departmental PKI. A policy within the ISE will ensure that the corporate device is profiled, classified and Guest Client controlled, such that the device type and security posture (anti-virus version, operating system patch level etc.) can be identified and an appropriate access policy applied. The Cisco ISE is feature-rich and many additional capabilities can be deployed to further secure the session, such as Security Group Tagging. The client could take advantage of the Cisco NAC client supplicant, so that continued and periodic checks can be performed upon the client to ensure that it still complies with the defined security policy after the authentication and authorisation stage completion. Design Approaches to Secure Wireless within UK Government 17 Once authentication is complete, the client’s wireless connection will be secured with dynamic keys using WPA2 AES-CCM encryption. All traffic from the access points will be tunnelled to the wireless controller using Data plane Transport Layer Security (DTLS) protected CAPWAP tunnels. Since an IPsec VPN will not be utilised in this approach, the wireless LAN controller will have full visibility of the wireless traffic and a range of application visibility controls can be utilised. At the most basic level, quality of service can be applied to the wireless traffic to ensure that voice and video applications can be prioritised. More advanced capabilities can also be deployed based on Cisco Application Visibility and Control (AVC) including: • Network-Based Application Recognition Version 2 (NBAR2), next-generation Deep Packet Inspection (DPI) technology that can identify more than 1000 applications and support application categorisation, with the ability to update the protocol definition. • NetFlow Version 9 export to select and export data of interest, allowing easy consumption of application performance statistics by Cisco and third-party applications. • Reporting and management tools, such as Cisco Prime™ Infrastructure with Assurance module, an enterprise-grade infrastructure and service-monitoring tool for reporting of application and network performance that can provide up to 30 different reports for application visibility. It is recognised that mixing of IL3 traffic with guest traffic will not be an acceptable deployment option and so it’s proposed that a separate infrastructure should be deployed that satisfies any requirement for guest access. This could take the form of any of the previous three models dependent upon specific guest requirements. 2.4.2 Enhanced Wireless Security With the addition of the Cisco MSE platform, both location tracking and fully featured IDS monitoring become a real feature of our wireless LAN solution. At the core of the Cisco Adaptive Wireless IPS is an advanced approach to wireless threat detection and performance management. While most market solutions rely solely on over-the-air passive traffic monitoring. The Cisco Adaptive Wireless IPS combines network traffic analysis, network device and topology information with signature-based techniques and anomaly detection to deliver highly accurate and complete wireless threat prevention. Because the solution is infrastructure integrated, Cisco can continually monitor wireless traffic on both the wired and wireless network. That network intelligence can be used to analyse attacks from many different sources of information to more accurately pinpoint and proactively prevent attacks instead of waiting until damage or exposure has occurred. Building upon the core detection capabilities, Cisco Adaptive Wireless IPS delivers rich attack classification as well as mitigation alerting, and reporting features. From a classification standpoint, the system provides users with flexible rules for automatically classifying security events. Automatic classification along with the system’s inherent accuracy, greatly reduces the operational expenses associated with manual investigation of potential threats detected by the system. The classification can also be linked with the threat mitigation actions, enabling either manual or automatic mitigation of security events based on their severity. The system can also alert IT operators of both detection and mitigation events based on the severity classification of the event. To assure full visibility into the wireless environment, Cisco Adaptive Wireless IPS also detects performance-related issues and non-802.11 devices (Bluetooth, radar, microwaves, etc.) 18 Design Approaches to Secure Wireless within UK Government “Integration with Cisco Prime means IT and the help desk can spend far less time on user and network security fixes and changes.” and attacks. Utilising radio resource management (RRM), the system provides unmatched performance and network selfhealing. Information collected relating to noise and interference, as well as client signal strength and other data, are used to dynamically assign channels and adjust access point transmit power in real time. This avoids co-channel interference, route around failed devices and minimises coverage holes. For performance degradation and attacks spawned by non-802.11 sources, the solution delivers an RF spectrum expert with the ability to detect non-802.11 devices or sources of interference that could mask denial-of-service attacks generated by non-802.11 devices. Non-802.11 devices such as Bluetooth access points can impact performance of wireless networks, or even more damaging, create ad hoc connections to your wireless network through authenticated client devices. Prime Infrastructure (PI) provides wireless IPS network management and reporting on a unified configuration as well as security event management and reporting with physical location tracking of where the security event took place on the network. With system forensics, an administrator can actually play back events with the ability to trace, locate, and capture any WLAN or RF event. Realtime security posture and events are viewed via a consolidated security dashboard in PI. Historical event data can be stored using the Mobility Services Engine (MSE) as a platform, allowing for access to large files with multiyear, forensic data reporting accessible via PI. This can allow for more complex analysis over time as well as compliance reporting. The Cisco access points can be deployed in three modes that can leverage the capability of wireless IPS. First the access points will be deployed as standard client serving devices, but will periodically come off channel to scan for the wireless threat. The second is to deploy access points specially as air monitors, thus giving greater granularity and control over the wireless threat. The last option is to deploy sensor modules, Wireless Security & Spectrum Intelligence Modules (WSSI) within the Cisco 3600 series access, where you then have the flexibility of servicing clients whilst have a dedicated monitoring device within the same AP. 2.4.3 Cisco ISE Benefits Cisco ISE is a next-generation identity and access control policy platform that enables enterprises to enforce compliance; enhance infrastructure security in wired, wireless, and BYOD environments; and simplify service operation. Cisco ISE offers this solution with the following benefits: • Improved operational efficiency: ISE on-boarding and security automation, central policy control, visibility, troubleshooting, and integration with Cisco Prime means IT and the help desk can spend far less time on user and network security fixes and changes. Design Approaches to Secure Wireless within UK Government 19 • Enhanced automated on-boarding: ISE self-service registration portal for BYOD, guest, and IT device onboarding automates AAA user identification, device profiling and posturing, 802.1X provisioning, and remediation, so it’s easy for employees to get their devices on-net and comply with security policy. • Enhanced automated device security: ISE provides device posture check and remediation options, including integration with MDM solutions and the lightweight Cisco Network Admission Control (NAC) Client, so it’s easy for users to keep their devices secure and policy-compliant. • Advanced anywhere access: ISE provisions policy on the network access device in real-time, so mobile or remote users can get consistent access to their services from wherever they enter the network. • Increased employee availability: Through wired, wireless, and VPN networks, the ISE allows enterprises to more easily authenticate and authorise users. This means more uptime and availability for employees who want to work from any location, at any time, from any device. • Advanced guest management services: Through provisioning, notification, management, and reporting of guest user accounts, the ISE provides complete guest lifecycle management by empowering sponsors to onboard guests, thus reducing IT workload. Since the platform automates much of this process, this can help save both time and money on security. • Amplified identity enforcement: ISE uses the industry’s first device profiler with automated updating to identify each device; match it to its user and to other attributes, including time, location, and network; and create a contextual identity so IT can apply granular control over who and what is allowed on the network. • Improved security policy enforcement: The ISE enforces security policies by blocking, isolating, and repairing noncompliant machines in a quarantine area without needing administrator attention. The platform can be set up with alerts for IT administrators for 24/7 policy enforcement of your network security protocols. • Advanced policy enforcement: Based on the users’ contextual identity, ISE sends secure access rules to the network point of access. IT is assured of consistent policy enforcement whether the user is trying to access the network from a wired, wireless, or VPN connection. • Enhanced infrastructure security: The ISE allows the gathering of real-time contextual information from the network, users, and devices, and makes proactive governance decisions by enforcing policy across the entire network infrastructure. • Improved security compliance: A single dashboard simplifies policy creation, visibility, and reporting across all company networks so it is easy to validate compliance for audits, regulatory requirements, and mandated federal 802.1X guidelines. • Improved network monitoring: Through periodic evaluation and remediation, the ISE addresses vulnerabilities on user machines. In addition, it is able to discover, classify, and associate identity for network endpoints connecting to the network. This makes it easier for IT teams to view the entire network at a glance and monitor traffic. 20 Design Approaches to Secure Wireless within UK Government Further information and validated design approaches, can be found here: http://www.cisco.com/en/US/netsol/ns982/networking_ solutions_program_home.html#~slng, 2.4.4 Mobile Device Management Support Cisco ISE platform integrates with a number of leading Mobile Device Management (MDM) platform vendors, such as MobileIron, airwatch, Citrix Zenprise, MaaS360, Good, iAnywhere, to name a few. These provide the ability to further enhance the manageability of the smart device such that the following can be easily achieved: • Containerise • Remote wipe • Back-up • Jailbreak • Pin lock • Personal devices this solution and a separate infrastructure will be required, which may take the form of any of the models previously described within this document, as appropriate. Not including guest wireless LAN traffic on the same infrastructure as a potential secure wireless LAN that is directed connected to an IL3 accredited network, is in line with current guidance published from CESG. This model offers the potential benefit of cost reductions by utilising existing LAN and WAN connectivity, without the need to purchase additional dedicated equipment or service provider WAN connections, to provide wireless LAN connectivity to trusted departmental corporate users. It will allow visibility of corporate client traffic, so that it can be identified and appropriately handled with Quality of Service to protect business critical applications and collaboration services, such as real-time traffic voice and video services. Should an organisation wish to deploy smart devices, ISE works closely with MDM platforms via an API, to check device health and specifies the level of control over devices. It enforces on Premise MDM device registration and restricts access. The MDM augments Endpoint Data and intelligence allowing ISE to take action on the device and the access rights. The Cisco NAC agent examines the Mac and Windows devices for things like OS & AV. Management can also be in-line with existing methods deployed for the departmental network management infrastructure and there would be no need to purchase additional management infrastructure to manage the IL3 based wireless LAN deployment. 2.4.5 Deviation from AP12 Guidance As a recap of the previous sections for this approach, this model deviates from the guidance within AP12. It suggests the direct connection of wireless LAN access points to the secure network and the use of the wireless LAN equipment to encrypt the wireless traffic for the managed client using 802.1x based EAP-TLS mutual authentication methods with AES CCMP WPA2 encryption as opposed to an IPsec based VPN solution. This solution would also rely upon the additional controls that may be adopted by the use of toolsets such as Identity Services Engine (ISE) with Mobile Device Management (MDM) integration and monitoring tools such as Prime Infrastructure (PI) with Mobility Services Engine (MSE) for wIPS and advanced location services. These extra measures can help to mitigate the risk by giving visibility of the trusted clients, where they are connecting from, what they are using to connect with, visibility of traffic from the client, adopting Quality of Service profiles and ability to periodically monitor the client to ensure that the policies and controls are not compromised. In addition to the ability to continuously monitor the RF environment for advanced wireless intrusion protection and mitigation. There will be no guest wireless LAN overlay integrated within Design Approaches to Secure Wireless within UK Government 21 This does add an extra layer of integrity to the solution, but will be at the expense of traffic visibility and thus the inability to apply appropriate Quality of Service to the business critical applications. By adopting this proposal, the solution could be considered to be more akin to methods deployed in the previous Manual Y guidance and adopting a more commercial Enterprise good practice approach. 2.4.6 Model 4b – Addition of VPN IPsec Overlay This approach considers the concerns that some customers may have with regards to connecting access points directly to the trusted environment and relying upon wireless LAN equipment encryption, which is not assured by CESG. 2.4.6 Model 4b - Addition of VPN IPsec Overlay Figure 6 – IL3 Based Connectivity with VPN Client Customer Data Centre Trusted Corporate resources VPN Concentrator WLC DHCP AD DMZ CA OCSP Boundary Firewall ISE Internet FW ISE WLC(s) MSE CAPWAP DTLS tunnel for all Access Point MSE Prime Infrastructure IL3 overlay PSN CE router MDM IL3 Overlay IL2 PSN WAN PSN CE router IL3 LAN Note - Guest access is optional and customer dependant. Approaches may vary dependant upon customer requirements IL0 WAN IL0 LAN CAPWAP DTLS tunnel for all Access Point Data Traffic via IL0 WAN internet via AP CAPWAP tunnel ‘Corp’ SSID 802.1x EAP-TLS WPA2-AES Corporate Managed Client 22 Any Connect VPN Client Guest SSID Open Customer Site Design Approaches to Secure Wireless within UK Government Guest Client 2.5 Architecture Management Consideration should be given to how any of the models previously described, will be managed effectively. Departmental groups responsible for network management may already have systems in place to manage and report on the trusted corporate network infrastructure components, but this may reside within an accredited IL3 based environment. Having a separate network infrastructure in an unclassified environment may present challenges as to how this network can either be incorporated into the existing network management infrastructure or investigate the requirement for a second management system to manage this isolated network infrastructure. It may be acceptable to manage an unclassified network component from an IL3 or IL2 based management infrastructure with the appropriate controls and protection in place, but this will be strictly down to the departmental accreditor to ensure that this is feasible or appropriate for the department in question. Clearly, additional management systems may increase cost or complexity to the solution, but may be unavoidable in some cases where management from an existing IL3 or IL2 based network management platform is deemed unacceptable. Management of the secure wireless LAN solution or Guest wireless LAN solution is out of scope of this document and it is recommended that a suitably qualified Cisco Partner is approached to understand the full design and configuration requirements for the solution. Design Approaches to Secure Wireless within UK Government 23 2.6 Architecture Sample Kit List The list below represents an example of kit that could be deployed. It does not represent a definitive or accurate list of equipment to order, as these will be subject to individual customer requirements. Full design and configurations are available through a qualified Cisco Partner. Scenario 1 AIR-CT2504-5-K9 2504 Wireless Controller with 5 AP Licenses WLAN controller 2500 series AIR-CAP2602I-E-K9 802.11n CAP w/CleanAir; 3x4:3SS; Mod; Int Ant; E Reg Domain 2600 series access point with CleanAir Optional wireless controller approach switch / wireless controller WS-C3850-48F-E Cisco Catalyst 3850 48 Port Full PoE IP Services Unified Access switch (contains IOS based wireless LAN controller) ISR router with SRE blade FL-SRE-WLC-5 5 access point license for Cisco Wireless Controller on SRE (when sold with ISR G2 system) Cisco Meraki Cloud Wireless LAN MR16-HW Meraki MR16 Cloud Managed AP Scenario 2 + 3 AIR-CT5508-50-K9 5508 Series Controller for up to 50 APs WLAN controller 5500 series AIR-CAP2602I-E-K9 802.11n CAP w/CleanAir; 3x4:3SS; Mod; Int Ant; E Reg Domain 2600 series access point with CleanAir HA option AIR-CT5508-HA-K9 Cisco 5508 Series Wireless Controller for High Availability Scenario 4 (not including guest) AIR-CT5508-50-K9 5508 Series Controller for up to 50 APs WLAN controller 5500 series AIR-CAP2602I-E-K9 802.11n CAP w/CleanAir; 3x4:3SS; Mod; Int Ant; E Reg Domain 2600 series access point with CleanAir HA option AIR-CT5508-HA-K9 Cisco 5508 Series Wireless Controller for High Availability Optional management R-PI12-BASE-K9 Prime Infrastructure 1.2 Base License and Software WLAN Management Optional Wireless Location and Security L-MSE-7.0-K9 MSE Virtual Appliance (Please select L-MSE-PAK for MSE Lic) L-MSE-PAK MSE License PAK (E Delivery) L-WIPS-ELM-100AP 100 AP WIPS Enhanced Local Mode licenses 24 Design Approaches to Secure Wireless within UK Government Mobility Services Engine Licenses for enhanced local mode Wireless Intrusion Protection - scans the channel that the access points are currently on. Optional advanced monitoring 100 AP WIPS Monitor Mode licenses Licenses for dedicated monitor mode access points - scan all channels for Wireless Instruction Protection AIR-CAS-1KC-K9 Context Aware License For 1K Clients and Tags (RSSI based) Context Aware L-AD-LS-100AP 100 AP Advanced Location Services licenses L-WIPS-MM-100AP Further enhanced location tracking Identity and Policy Management ISE-VM-K9 Cisco Identity Services Engine VM Cisco Identity Services Engine (ISE) L-ISE-AD5Y-W-100= Cisco ISE 100 Endpoint 5 Year Wireless Subscription License Wireless license for Ise 2.7 Model Comparison The table below attempts to demonstrate feature comparisons between the four wireless deployment models proposed in this document: Model 1 Model 2 AP12 - local AP12 - Central WLC OR Cloud WLC Based Capabilities Model 3 WLAN via IL2 PSN WAN Model 4 WLAN via IL3 Common wireless Infrastructure Corporate only 4 4 4 4 Corporate + Guest 4 4 8 8 Corporate + Guest + Contractor 4 4 8 8 8 8 4 4 Simple 4 4 8 8 Intermediate 8 8 8 8 Complex 8 8 4 4 VPN Software 4 4 8 89 VPN Software licenses required for VPN Concentrator 4 4 8 89 41 41 88 88 Wireless Encryption WPA2 AES CCM 8 8 4 4 AAA 8 8 4 4 802.1X 8 8 4 4 Client Digital Certificates 8 8 4 4 EAP-TLS 8 8 4 4 Separate Corporate and Guest Infrastructure Isolated Corporate and Guest Infrastructure Solution Complexity Corporate Client Wireless Authentication & Security Wireless Encryption Pre-Shared-Key (PSK) Design Approaches to Secure Wireless within UK Government 25 Model 1 Model 2 AP12 - local AP12 - Central WLC OR Cloud WLC Based Capabilities Model 3 WLAN via IL2 PSN WAN Model 4 WLAN via IL3 Corporate WAN Connectivity Requires additional WAN circuit 4 4 8 8 Requires additional WAN routers 4 4 8 8 Uses customers existing PSN based WAN (IL2) 8 8 4 4 Uses customers existing PSN based WAN (IL3 overlay) 8 8 8 4 4 4 8 8 4 4 8 8 8 8 4 8 8 8 8 4 42 42 42 42 Requires DMZ connectivity for corporate only 4 4 4 8 Requires DMZ connectivity for guest only 4 4 4 4 Corporate Wired and Wireless Authentication 8 8 4 4 Requires DMZ connectivity for corporate and guest traffic 4 4 8 8 Requires DMZ connectivity for corporate only 4 4 8 8 Requires DMZ connectivity for guest only 4 4 4 4 Local Site Corporate WLAN Connectivity Requires additional LAN Cabling Requires additional dedicated LAN switches, used for Corporate and Guest traffic Access Points connected directly to customers existing PSN based ( IL2 ) LAN Access Points connected directly to customers existing PSN based ( IL3 ) LAN Requires additional dedicated LAN switches for Guest only Options for Central Data Centre Solution - 5 Application Visibility and Control - 6 Application visibility and Control for Corporate traffic 8 8 4 4 Application visibility and Control for Guest traffic 4 4 4 4 Identify Corporate traffic type and apply QoS 8 8 4 4 Identify Guest traffic type and apply QoS 4 4 4 4 Secure Group tagging for corporate clients 8 8 4 4 Posture Assessment and Remediation 8 8 4 4 Authorisation and Change of Authorisation 8 8 4 4 Device Profiling 8 8 4 4 Policy Enforcement (VLAN; dACL; SGACL) 8 8 4 4 Quality of Service - 6 Corporate Client Security 26 Design Approaches to Secure Wireless within UK Government Model 1 Model 2 AP12 - local AP12 - Central WLC OR Cloud WLC Based Capabilities Model 3 WLAN via IL2 PSN WAN Model 4 WLAN via IL3 4 4 4 4 4 4 4 4 BYOD - Corporate Mobile Device Management Wi-Fi Profile Provisioning Certificate Provisioning Native VPN Configuration Provisioning see note -10 see note -10 Microsoft Exchange Active Sync Access Management BYOD - Corporate Mobile Application Management Distribution of Public Applications 8 8 4 4 Distribution of Private Applications 8 8 4 4 Application Single Sign On 8 8 4 4 Application Specific VPN 8 8 4 4 Selective Wipe 8 8 4 4 Containerisation 8 8 4 4 Device Pass Code Policy 8 8 4 4 Camera / Face Time Restrictions 8 8 4 4 Use of Controller ‘Lobby Ambassador’ for Guest 4 4 Local Internet Break-out for Guest users 4 8 Central Internet Break-out for Guest users 8 4 Identify Guest traffic type and apply QoS 46 46 Simple guest port pages 4 4 see note - 7 see note - 7 Comprehensive Guest portal pages 8 8 Active Directory Integration 8 8 Policy Enforcement (VLAN; dACL; SGACL) 8 8 Guest User Experience Notes: 1 Option to use either PSK or 802.1x to facilitate wireless encryption 2 Optional if guest access required 3 Optional with ISE 4 optional with dedicated guest infrastructure 5 assumes no direct connection to company VPN concentrator, except via a WAN connection 6 Note - dependant upon wireless topology deployed 7Guest access for a secure wireless LAN solution will be an optional add on, separate infrastructure. This may take the form of any of the options presented earlier in the document 8 Typically, 802.1x authentication would be recommended 9 Optional if required on top of existing wireless AAA methods 10Onboarding of corporate managed devices prior to launch of VPN client for connectivity may be possible and will be dependent upon topology deployed (e.g. reachability of AD for example) Design Approaches to Secure Wireless within UK Government 27 28 Design Approaches to Secure Wireless within UK Government 2.8 General Wireless Design Considerations When adopting any of the models proposed above, the following areas may be a consideration when embarking upon a solution. 2.8.1 and steps can be taken to tighten the control over the client actively, such as time of day that the service can be accessed, downloadable access control lists or security group tagging. Points for Consideration • IP Address Management – how clients and also the access points gain their IP address for either a dedicated local solution or DMZ centralised solution. Also, if a smaller solution, will this be provided by the network equipment, or for larger solutions, will this be provided by dedicated equipment? If so, additional servers / management will be required. • Guest Account Management – for a small solution, guest portals and logins can be created via the wireless LAN controller. If in doing so, access will be required by receptionist or identified individuals to create and manage guest user accounts on behalf of their visitors. If this wireless LAN equipment is on a dedicated and physically separate LAN, then access to create and / or print these accounts details will be required either directly – with dedicated provisioning PCs and printer, for example, or access remotely via an internet connection from the departmental infrastructure. Similarly, for larger deployments where a centralised wireless controller or even the use of Cisco ISE is utilised for guest account creation, access to these devices should be considered. If accessing these resources from the departmental trusted infrastructure, then a method of either access directly via various protection level firewalls or having admin access to the devices via an Internet connection may need to be considered. • Guest account creation – in line with the previous comment, if a wireless controller based portal is used for guests, this may require a departmental receptionist or corporate sponsor to create accounts for individuals as they arrive. For a more productive approach, ISE could be utilised to provision guest accounts, either by sponsor provisioning, where a corporate user for whom the guest are visiting can setup accounts on the guest behalf or authorise these guest accounts. Alternatively the guest user can self-provision and create their wireless guest account upon arrival. These help speed up the guest provisioning. • Control of Guest Access – guest accounts within the wireless controller will be effective from account creation valid from until expiry. With Cisco ISE, the account will become active from first logon and additional measures • Application visibility and control – if an AP12 approach is adopted for wireless deployment, this traffic will not be visible to the network infrastructure as it traverses. As a result, if there are any time critical applications that may depend upon Quality of Service (QoS) to ensure a reliable delivery, this may not be possible within a VPN type scenario. An example could be a client laptop that is being used for general email and Internet traffic, but is also being used for collaboration services, such as WebEx Connect or Jabber Video for TelePresence. Without the ability to conduct a deep packet inspection on these traffic types and apply a QoS parameters based upon the application type, as opposed to the source IP, for example, the user experience of these applications could be impacted. • Single or Dual SSID - Depending upon local department security requirements, some corporate builds devices may only allow VPN connections if the device is not connected directly to the corporate LAN. As a result, this type of client may not have the ability to connect to a web front-end guest portal to enter a username / password prior to launching a VPN client. Therefore, consideration should be given to whether single SSID for all clients (corporate and visitors), or separate SSIDs (one for corporate and one for all other devices) or some method of captive portal bypass would be necessary (may require advanced devices such as ISE). • Cost for additional infrastructure to support wireless users – i.e. RF surveys, Installation & Cabling, PoE LAN switches, WAN routers, WAN circuits etc. • Remote management – Some manage service contracts may be based around managing the departmental networks via an accredited management platform that either resides within the customer’s own network or within a dedicated restricted management infrastructure. There could be complexities around managing equipment from a restricted environment or having to create bespoke solutions to manage unclassified equipment whose only access is potentially via an Internet connection. The potential to manage via an Internet connection / security concerns (e.g. potential need to create IPsec tunnels to manage equipment) is a consideration. Design Approaches to Secure Wireless within UK Government 29 • Guest user experience - custom portal pages tailored specifically to give the look and feel of the department where the guest wireless is accessed; BYOD on-boarding of guest devices, self-provisioning or sponsored access by guest devices are all better leverage via the use of Cisco ISE. Whilst the Cisco Wireless LAN controller can host basic portal pages, these will be basic on comparison to a Cisco ISE solution and may not have the ability to add more webfeatures that may be demanded from the department. • Location tracking & wIPS – Advanced location tracking and advanced wireless Intrusion Prevention System may be a requirement for the departmental security requirements and these can be best leverage with the Cisco MSE platform. This may also steer the design of the deployed wireless LAN access points, due to potential additional access points for dedicated monitoring or tracking purposes. 30 Design Approaches to Secure Wireless within UK Government • Potential use for federating RADIUS function – as a future thought, there could be a potential to federate the local wireless LAN deployment with other similar deployments of other government departments. This would require an enterprise-deployed approach to the model 4, as described in this document. Aligned PSN connected departments could potentially advertise a common SSID across their estates, so that any user from within this client base could associate and authenticate with the local system, to a federated centralised RADIUS server, to their own RADIUS server, thus authentication and authorising access to the local resources. This may be compared to how education departments access resources for JANET via the Eduroam system. Investigation would be required to understand the potential for this approach. Full design and configurations are available through a qualified Cisco Partner. 2.9 Architecture Enhancements By adopting any of the proposed solutions, consideration should be given upon how to best utilise the architecture deployed. 2.9.1 Enhancements to the Service There are many approaches that could be taken for the proposed topology type and this will depend upon the individual customer requirements. Cisco has a breadth of products across the portfolio that can be leveraged to consolidate services or enhance the user experience. Additions to the previous models described could be considered. • Utilisation of Cisco ISR routers for the WAN device with SRE (Service Ready Engine) modules – for example, (1) SRE modules to accommodate a virtual Wireless LAN controller instance (2) SRE modules to accommodate a virtual ISE instance for more control over guest users • Additional centralised filtering within DMZ for guest users to ensure that this company policy internet usage policy is being enforced. This may include URL filtering, identification of client traffic, anti-Spam / Anti-virus etc. Example devices could be Cisco IronPort • Cisco Mobility Services Engine (MSE) – for advanced wireless Intrusion Prevention System (wIPS) and advanced location services. In order to provide protection against rogue clients and access points it is highly useful to be able to locate that device in the physical world, especially to differentiate whether it is within your physical boundaries, or outside. Only if a rogue is detected inside your physical domain are you legally entitled to perform any sort of over the air prevention tactics, such as sending de-auth frames. The Cisco Prime Infrastructure management platform allows an administrator to locate a single rogue device to 95% accuracy. However, to locate, and record historic locations of multiple rogue devices and indeed any Wi-Fi based device such as a tags or PDAs, a location services engine can be deployed. This can also be used as the engine to drive asset-tracking applications from third party companies such as Aeroscout and Airetrack • Cisco Identity Services Engine (ISE) – for advanced AAA services, BYOD, profiling and guest authentication • Cisco Prime Infrastructure – from management of all Cisco network devices upon the LAN – switches, routers, wireless LAN controllers • Utilisation of Cisco Unified Access switch, 3850, for combined PoE switching and wireless LAN capability within a single device, helping to reduce the TCO and OpEx and may reduce the management overhead Full design and configurations are available through a qualified Cisco Partner 2.10 Guest User Experience In deploying a scenario where guest wireless LAN connectivity is a requirement, understanding how the guest user will connect, from what device, how they will authenticate and ultimately, what controls need to be applied, will fundamentally dictate the direction of both eh topology and network devices deployed. 2.10.1 Guest User Experience The user experience from a guest perspective can be dramatically enhanced by adding Cisco Identity Services Engine (ISE) as the main method for AAA authentication and controlling guest access. Whilst there is a capability within the wireless controller to provide basic captive port access to guest users, adding ISE will leverage capability to provide BYOD on-boarding, as well as the ability for device authentication, authorisation, profiling, posture checking and policies to apply to accessing clients. In essence, this can identify ‘who’ the client is, ‘what’ they are accessing, ‘where’ they are accessing it from, ‘when’ they are allowed access and ‘how’ they will be allowed access. With a Cisco ISE platform centrally within the DMZ, this dramatically increases the Guest capability and scalability of the solution to allow the service to be conducted for multiple customer sites or instances, giving the same user experience to clients, regardless of site they are connecting from. Design Approaches to Secure Wireless within UK Government 31 32 Design Approaches to Secure Wireless within UK Government 3. Cisco Differentiators Proposal for Government Design Approaches Departments to Secure / CiscoWireless Secure Wireless within UKLAN Government Proposal 33 3.1 Cisco Differentiators For WLANs, Cisco delivers exceptional customer value. Cisco distinguishes itself from its competitors through differentiators at three levels: business, solution, and product / technical. The unique customer value that we can provide gives us our leading position in the wireless LAN and outdoor Wi-Fi markets. At the business level, the following differentiators distinguish Cisco from its competitors: • The confidence of working with an industry leader • High level of WLAN expertise • Large scale corporate wide deployments within months • Consistent, stable, long-term WLAN supplier • Lower TCO • Focus on protecting network investments • Financial choices for customers At the solution level, the following differentiators distinguish Cisco: • Complete networking solutions • Confidence in deployment • Lower operation cost • Multiple deployment options • Lower operational cost 34 Design Approaches to Secure Wireless within UK Government Cisco’s differentiators at the product / technical level include the following: • Leading product functionality and Performance • Deployment flexibility • Optimised for Video and Voice delivery (VoWLAN) • Superior industry expertise and project management • Secure wireless networks • Mobility service integration such as location based service • Lower operational cost Tables are available with details on the differentiators and customer value if needed. “It is imperative that the wireless service which carries this information has the ability to distinguish between these differing streams of data, such that any Quality of Service may be applied.” Design Approaches to Secure Wireless within UK Government 35 36 Design Approaches to Secure Wireless within UK Government 4.Appendix Proposal for Government Design Approaches Departments to Secure / CiscoWireless Secure Wireless within UKLAN Government Proposal 37 4 Appendix The links below represent some of the main areas from the Cisco Mobility wireless LAN solution. Full details are available through a Cisco Partner. 4.1.1 Cisco Key Wireless LAN Key Technology Areas Cisco CleanAir Technology http://www.cisco.com/en/US/solutions/collateral/ns340/ns394/ns348/ns1070/aag_c22-594304.pdf Cisco ClientLink http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps11983/at_a_glance_c45-691984.pdf Cisco VideoStream http://www.cisco.com/en/US/solutions/collateral/ns340/ns394/ns348/ns1070/at_a_glance_c45-688062.pdf Cisco 3700 Series Access Point – http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps13367/data_sheet_c78-729421.pdf Cisco 3600 Series Access Point http://www.cisco.com/en/US/prod/collateral/wireless/ps5678/ps11983/data_sheet_c78-686782.pdf Cisco WSSI Module http://wwwin.cisco.com/tech/products/aironet3600/wssi.shtml Cisco 802.11ac Module http://www.cisco.com/en/US/prod/collateral/modules/ps12859/ps13128/data_sheet_c78-727794.pdf 4.1.2 Cisco Cloud Managed Wireless LAN https://meraki.cisco.com/products/wireless#features 4.1.3 Cisco WLAN Controllers 4.1.3.1 Cisco Flex 7500 Series Cloud Controller For more information, please see: http://www.cisco.com/en/US/prod/collateral/wireless/ps6302/ps8322/ps11635/data_sheet_c78-650053.pdf 4.1.3.2 Cisco 5500 Series WLAN Controller For more information, please see: http://www.cisco.com/en/US/prod/collateral/wireless/ps6302/ps8322/ps11630/data_sheet_c78-645111.pdf 4.1.2.3 Cisco 2500 Series Wireless Controller For more information, please see: http://www.cisco.com/en/US/prod/collateral/wireless/ps6302/ps8322/ps11630/data_sheet_c78-645111.pdf 4.1.3.4 Cisco WiSM 2 for Catalyst 6500 Series Switches For more information, please see: http://www.cisco.com/en/US/prod/collateral/modules/ps2706/ps6526/product_data_sheet0900aecd80364340.html 4.1.3.5 Cisco Wireless Controller Software for the Cisco SRE For more information, please see: http://www.cisco.com/en/US/prod/collateral/wireless/ps6302/ps9798/ps11716/data_sheet_c78-648142.pdf 4.1.3.6 Cisco Virtual Wireless Controllers (vWLC) Wireless Controllers Product Information http://wwwin.cisco.com/tech/wnbu/products/controllers.shtml 38 Design Approaches to Secure Wireless within UK Government 4.2 Cisco Wireless Network Management 4.2.1.1 Cisco Prime Infrastructure (PI) For more information, please see: http://www.cisco.com/en/US/prod/collateral/wireless/ps5755/ps11682/ps11686/ps11688/data_sheet_c78-650051.pdf 4.3 Cisco Mobility Services Engine (MSE) http://www.cisco.com/en/US/products/ps9742/ 4.4 Cisco Identity Services Engine (ISE) 4.4.1 Cisco ISE Appliances For more information, please see: http://www.cisco.com/en/US/products/ps11640/index.html 4.4.2 Cisco Secure Network Server For more information, please see: http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5712/ps11640/data_sheet_c78-726524.html 4.4.3 Cisco ISE Licensing For more information, please see: http://www.cisco.com/en/US/products/ps11640/index.html Design Approaches to Secure Wireless within UK Government 39 402014 Cisco © Design and Approaches / or its affiliates/ to Secure All right Wireless reserved. within UK Government