Solution of Wireless Authentication Base on PnPVPN

advertisement
Solution of Wireless Authentication
Base on PnPVPN
Hillstone Networks Inc.
July 31th, 2015
Author
Auditor
Tianjiao Chen
Version
Date
1.0
2015-07-31
Contents
1
Solution Background .................................................................................................... 3
2
Requirements Analysis ................................................................................................. 4
2.1
2.2
3
Solution ......................................................................................................................... 7
3.1
3.2
4
Topology ......................................................................................................... 7
System Deployment Statements ................................................................... 7
3.2.1
PnP VPN Deployment ....................................................................................... 7
3.2.2
Branch Wireless Coverage Deployment............................................................ 8
3.2.3
Headquarter Firewall Policy Deployment ......................................................... 8
Implementation ............................................................................................................. 9
4.1
4.2
5
Wireless Network Building Target .................................................................. 4
The Entire Network Security Target ............................................................... 4
2.2.1
The Compliance of Requirement for Access and Control ................................. 4
2.2.2
Guarantee the Healthy Internet Access ............................................................. 5
Verification Topology ...................................................................................... 9
Regarding Configuration ................................................................................ 9
4.2.1
Headquarter Office Configuration..................................................................... 9
4.2.2
Branch Configuration ...................................................................................... 12
4.2.3
Attention Point of Solution ............................................................................. 13
Effectiveness .............................................................................................................. 14
1 Solution Background
There is a company with one headquarter office and few more branch connecting
with client to client VPN, the network topology as below:
A.
Link Type:
a) 4M ADSL
b) 2M Telecom Special Line
c) China Unicom 3G Network
B.
Main Device Model:
a) Branch Store: VPN Router Device-- CISCO RV042 ,Hikvision Monitoring
b) Headquarter: Firewall-CISCO ASA5540,Core Switch Model:H3C S7510E
2 Requirements Analysis
2.1 Wireless Network Building Target
A. According to the current company network architecture to perform the
deployment of full wireless coverage with all the stores.
B. Using headquarter firewall to connect with store in wireless security gateway
mode by PnP VPN to replace the current VPN router(RV042) to headquarter
CISCO ASA5540 by client to client of IPsec connection.
C. The headquarter firewall centralized united management and controlling of all
the store’s wireless security gateway.
D. Centralized united management and authentication of remote terminal device,
make sure only permitted device can access network.
E. Perform the network security policy base on the policy management of user or
role.
F. Perform the manageability, security, security defense and WEB filtering of
wireless network.
G. Perform the current and future application system running stable in the safe
wireless platform.
2.2 The Entire Network Security Target
2.2.1 The Compliance of Requirement for Access and Control
A. The key precautions:Proceed effective control base on access source, access
target, access action and access time.
The principal element of network security construction is access control, the
core of control is access action, which should block the access from nonpermission access and limit the resource of use-pattern of employee and guest.
The business diversification of enterprise will cause the diversification of access
action. Therefore, it is extremely important to recognize the permitted access and
non-permitted access, especially for the access action of internet, the effectively
control measures should be taken to avoid the access action with overuse
bandwidth and guarantee the normal service and internet access.
For those important application server and database of enterprise, it should
recognize the legal business access and potential attack access action, taking the
necessary security control method to guarantee the key business access.
2.2.2 Guarantee the Healthy Internet Access
A. The key precautions:Depth recognition of application(P2P、IM、Online game、
Online Video、Stocks etc) and access control;URL filtering
Access control is the most important role of enterprise information network 访
security, but the traditional access control technology is getting more and more
new challenge now, the most classic one is that the current internet application
becomes more and more intelligent, some of accesses are hard to be recognize,
for example, P2P, Online video and IM etc.
Need to recognize role and control
A. The key precautions:Identity of identification and role definition; Access control
base on user role
Distribute the regarding resource according to the role. In the application
system, distribute the accessible content and accessible data according to the
user role, and consider the network resource distribution, for example,
bandwidth source distribution, different server access permission for different
user role etc.
3 Solution
3.1 Topology
3.2 System Deployment Statements
3.2.1 PnP VPN Deployment
PnPVPN means plug and play VPN, it contain two parts:
♦ PnPVPN Server,usually deployed in the Headquarter of enterprise, IT engineer
is responsible for the maintenance, the configuration of client will be release from
the server end. PnPVPN Server usually select Hillstone SG series.
♦ PnPVPN Client,usually deployed in the branch of enterprise, IT engineer is
responsible for the maintenance work via remote session, simple configuration
need only( for example, client ID, password and server IP address), get configuration
information form the server side after the negotiation with server(for example, DNS,
WINS, DHCP pool etc). PnPVPN Server usually select Hillstone SG series.
3.2.2 Branch Wireless Coverage Deployment
The wireless coverage of security wireless gateway to store is using 802.11b/g/n
technology , with independent security defense, anti-virus, IPS etc, signal
strength >=-75dBm。
3.2.3 Headquarter Firewall Policy Deployment
A. WEB Authentication
Web authentication function is using for the identity identification of user who
access to the internet. Hillstone Security appliance supports the third party
authentication, which is able to perform the access control under “real name”,
it will enhance the accuracy of access control.
B. Access Control Policy
a) Limit the non-permitted access type:web surfing, email, file-transmission
etc.
b) Limit the non-permitted access address:Limit the access of parts webpage
according to URL filtering and HTTP behavior control.
c) Access control base on Role:Accuracy location.
4 Implementation
4.1 Verification Topology
4.2 Regarding Configuration
4.2.1 Headquarter Office Configuration
Hardware Platform:SG-6000-E1700
Verification Version:SG6000-M-3-5.0R4P7.bin
Regarding Configuration:
A. Interface Configuration
interface ethernet0/1
zone "untrust"
ip address 10.88.16.127 255.255.255.0
exit
interface ethernet0/2
zone "trust"
ip address 201.1.1.1 255.255.255.0
exit
interface tunnel1
zone "VPNHub"
ip address 1.1.1.1 255.255.255.0
manage ping
tunnel ipsec "client2" gw 1.1.1.10
exit
B. PnPVPN configuration
aaa-server "local" type local
user "client2"
password "zpto+QVnNtQ6aBxI3uJKlzJ7I8Y0"
ike-id fqdn "client2"
dhcp-pool-gateway 192.168.3.1
dhcp-pool-netmask 255.255.255.0
tunnel-ip-address 1.1.1.10
dhcp-pool-address 192.168.3.2 192.168.3.254
dns 10.86.249.11 10.88.7.10
split-tunnel-route 0.0.0.0/0
exit
isakmp peer "client2"
mode aggressive
type usergroup
isakmp-proposal "psk-md5-des-g2"
pre-share "myjGXapxRNhjvI3wf8xOGT9IuYIBI0"
aaa-server "local"
interface ethernet0/2
exit
tunnel ipsec "client2" auto
isakmp-peer "client2"
ipsec-proposal "esp-md5-des-g2"
exit
C. Routing Configuration
ip vrouter "trust-vr"
ip route 192.168.3.0/24 tunnel1 1.1.1.10
exit
D. Network Behavior Configuration
behavior-profile "shopping"
http get "*.jd.com" block log
rule id 2193
exit
role "http-role"
role "hillstone"
role-mapping-rule "map"
match user "test" role "http-role"
match user "hillstone" role "hillstone"
exit
aaa-server "local" type local
role-mapping-rule "map"
user "test"
password "inz0ZGoEnlAF2TjMzAKVjSmaNZQa"
exit
rule id 2193 #WEBUI Automatic generated Policy of HTTP control via NBC
dst-zone "untrust"
src-addr "Any"
dst-addr "Any"
service "Any"
role "http-role"
behavior "shopping"
exit
rule id 10
action permit
src-zone "VPNHub"
dst-zone "untrust"
src-addr "Any"
dst-addr "Any"
service "DNS"
exit
rule id 9
action webauth "local"
src-zone "VPNHub"
dst-zone "untrust"
src-addr "Any"
dst-addr "Any"
service "Any"
role "unknown"
exit
rule id 8
action permit
src-zone "VPNHub"
dst-zone "untrust"
src-addr "Any"
dst-addr "Any"
service "HTTP"
service "HTTPS"
role "http-role"
exit
rule id 2
action permit
src-zone "VPNHub"
dst-zone "untrust"
src-addr "Any"
dst-addr "Any"
service "Any"
role "hillstone"
exit
E. Complete Configuration
4.2.2 Branch Configuration
Hardware Platform:SG-6000-E1100
Verification Version:SG6000-M-3-5.0R4P7.bin
A. Interface Configuration
interface ethernet0/4
zone "untrust"
ip address 201.1.1.2 255.255.255.0
exit
interface wlan0/2
zone "trust"
ip address 192.168.3.1 255.255.255.0
dns-proxy
manage ping
dhcp-server enable pool "pnpauto"
exit
interface tunnel1
zone "VPN"
ip address 1.1.1.10 255.255.255.255
tunnel ipsec "PnP-vpn" gw 201.1.1.1
exit
B. PnP configuration
isakmp peer "PnP-vpn"
mode aggressive
type pnp-vpn
pre-share "IGKuErMzVl7g5AuZIF0eLb5tWpMY42Dp4wQfuN6o5VILqsG0DU"
peer 201.1.1.1
local-id fqdn "client2"
connection-type initiator-only
nat-traversal
dpd interval 2 retry 4
interface ethernet0/4
exit
tunnel ipsec "PnP-vpn" auto
isakmp-peer "PnP-vpn"
auto-connect
auto-save
interface-start-dhcp wlan0/2
exit
dhcp-server pool "pnpauto"
netmask 255.255.255.0
gateway 192.168.3.1
address 192.168.3.2 192.168.3.254
exit
C. Complete Configuration
4.2.3 Attention Point of Solution
A. The PnPVPN tunnel interface of Headquarter office must configure IP address,
also the PnP client user also need to release tunnel interface IP
B. Must fill up the gateway (the regarding branch tunnel interface IP address) when
bind the Headquarter tunnel interface.
C. The route from headquarter to the branch also need to configure gateway,
which means the regarding branch tunnel interface IP address.
5 Effectiveness
A. The branch side only need to configure simple PnP client to get the regarding
configuration, all the configuration will be managed by the administrator of
headquarter, it will reduce the maintenance cost of branch side.
B. The configuration of headquarter base on the RBNS of role to control the user
of branch via real name authentication, for example, the regarding role “httprole” of user “Test” can access any webpage without “ebay”, but the
regarding role “Hillstone” of user “Hillstone” can access any webpage
without any limitation.
Download