Security on Cisco Catalyst 6800 Series At-A-Glance

advertisement
At-A-Glance
Security on Cisco Catalyst 6800 Series
ENABLING AN INTELLIGENT CAMPUS SELF-DEFENDING NETWORK
Needs in Campus Networks Security Today
With the rise of bring your own device (BYOD), mobility, and smart devices, customers
need to support different kinds of devices, such as personal smartphones, laptops, and
tablets, in their corporate networks today. With the proliferation of devices connecting
to the campus network, customers need a solution that helps them meet their security
policies when these devices use network resources. The study by Cisco IBSG in Figure 1
shows security is now the top challenge for BYOD adoption for enterprise customers.
Figure 1. Percentage of Companies That Find Security the Top BYOD Challenge
38%
23%
The complete security solution in the campus network with Cisco Catalyst 6800 Series
Switches in the core and distribution provides the following advantages:
• Lowers security risks by providing comprehensive visibility of who and what are
connecting to the wired or wireless network
• Offers exceptional control over activity of network users accessing physical or
cloud-based IT resources
• Provides a growing mobile and complex workforce with appropriate and more
secure access from any device
36%
33%
26%
solutions with the Cisco Catalyst 6800 at core and distribution can address the campus
security needs brought by BYOD and other technologies.
• Reduces total cost of ownership through centralized, highly secure access policy
management and scalable enforcement mechanisms
25%
• Integration with Cisco SecureX Architecture® to allow end-to-end use of networkbased identity context for full context-aware firewalling and policy enforcement
22%
19%
17%
14%
Comprehensive Security Solutions with Cisco Catalyst 6800
Series Switches
The Cisco Catalyst 6880-X and 6807-XL switches help secure networks and provide
secure access through the following primary feature categories:
Total
U.S.
U.K. Germany France Russia
China
India
Mexico
Source: Cisco IBSG, 2012
Brazil
N = 4,892
Campus networks must establish the minimum security baseline that any device must
meet to be connected the corporate network, including Wi-Fi security, VPN access,
and additional software to protect against malware. In addition, because of the wide
range of devices, it is critical to be able to identify each device connecting to the
network and authenticate both the device and the person using it.
Benefits of Cisco Campus Security Solutions
Cisco® Catalyst® 6500 Series Switches are the industry leader in advanced security
solutions in the campus network space. The successor, the Cisco Catalyst 6800 Series
Switches, build on top of that foundation and do more. The Cisco Campus Security
Solution with Cisco Catalyst 6800 Series Switches centers around Cisco TrustSec®
security, ASA firewall service module, First Hop Security (FHS) (IPv4 and IPv6),
hardware rate limiting, and control plane policing (COPP). End-to-end campus network
Cisco TrustSec
Cisco TrustSec enables role-based policy definitions in a centralized policy engine
(ISE) and the distributed enforcement of those policies in the network infrastructure
independent of network architecture. This provides the ability to define granular
policies based on user role, device, location, and posture while making policy definition
and change management operationally efficient. The Cisco Catalyst 6800 supports full
Cisco TrustSec capabilities with hardware acceleration for security group tag (SGT)
imposition and IEEE 802.1AE MACsec at wire-speed rates. Security group access
control lists (SGACLs) can be used to control the operations that users can perform
based on the security group assignments of users and destination resources.
Single Consistent Security Policy with Instant Access
Instant access provides a single consistent security policy across the instant access
system because the security policies are applied on the single extended switch. IT can
stay compliant with regulations cost effectively. It enables supporting a wide range of
authentication options at the access, including 802.1x for managed devices and users,
web authentication for guests or non-802.1x users, and MAC authentication bypass
for unmanaged or non-802.1x devices.
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
At-A-Glance
IP Source Guard and Dynamic ARP Inspection
IP Source Guard provides source IP address filtering on a Layer 2 port to prevent a
malicious host from impersonating a legitimate host by assuming the legitimate host’s
IP address. Dynamic ARP Inspection (DAI) is a security feature that validates Address
Resolution Protocol (ARP) packets in a network. DAI intercepts, logs, and discards ARP
packets with invalid IP-to-MAC address bindings. This capability protects the network
from some man-in-the-middle attacks.
Cisco ASA Firewall Service Module
Installed inside a Cisco Catalyst 6800 Series Switch, the ASA Services Module allows
any port on the device to operate as a firewall port and integrates firewall security
inside the network infrastructure. The ASA Services Module can handle up to 16 Gbps
of traffic, providing unsurpassed performance to meet future requirements. It works
in tandem with other modules in the chassis to deliver robust security throughout the
entire chassis, effectively making every port in the switch a security port.
Catalyst 6500 has additional security features highlighted below which further secures
the campus network:
• IPv4 FHS: Cisco Catalyst switches offer Cisco Integrated Security Features, an
industry-leading solution that provides superior Layer 2 threat defense capabilities
for mitigating man-in-the-middle attacks (such as MAC, IP, and ARP spoofing).
Delivering powerful, easy-to-use tools to effectively prevent the most common and
potentially damaging Layer 2 security threats, Cisco Integrated Security Features
provide robust security throughout the network.
• IPv6 FHS: IPv6 raises a number of FHS concerns that were not present in IPv4.
Those concerns stem from the protocol’s unique manner in which it performs router
and neighbor discovery, address assignment, and address resolution using Neighbor
Discovery Protocol (NDP). These mechanisms could allow an attacker to deploy
attacks such as traffic interception, denial of service (DoS), or man in the middle.
Figure 2 shows the end to end security Cisco Trustsec enables in the Campus with
802.1X, SGT, SGACL and ISE working in conjunction with each other.
• COPP: The CoPP feature increases security on the switch by protecting the RP
from unnecessary or DoS traffic and giving priority to important control plane and
management traffic. CoPP provides filtering and rate-limiting capabilities for the
control plane packets to protect the control and management planes and makes
sure of routing stability, reachability, and packet delivery.
Figure 2. How Cisco Trustsec Works in the Campus
For More Information
Cisco Catalyst 6800 End-to-End Security
www.cisco.com/go/6800
www.cisco.com/go/security
Where
What
Who
When
APP
SGACL Enforcement
How
Cisco Catalyst 6800
IDENTITY
Security
Group
Tagging and
Forwarding
SGT
SGT
SGT
SGT
SGT
cts role-based permissions from
100 to 42
permit tcp dst eq 443
permit tcp dst eq 80
deny ip
SG
T
RADIUS Session
SG
T
T
SG
Network Device Authentication
IP Address
SGT
10.1.1.1
100
10.1.1.2
110
10.1.1.3
42
Cisco Catalyst 6800
SXP
Session
1x, MAB, Web Auth
Identity
Service
Engine
Cisco
TrustSec Domain
IP Address
SGT
10.1.1.1
100
10.1.1.2
110
10.1.1.3
42
Identity
Services
with SXP
for SGT
Mapping
© 2013 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks.
Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
C45-729471-00 09/13
Download