BYOD:
Bring Your Own Device
Goran Peteh
Channel Systems Engineer
Sarajevo, 15.11.2012.
© 2012 Cisco and/or its affiliates. All rights reserved.
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
2
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
3
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
4
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
5
Policy Access Control: Challenges and Architecture
Security Group Access and TrustSec
Cisco Access Devices and Identity
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
6
BYOD On-Boarding
Zero touch registration & provisioning of employee/guest devices
Unified Policy-based Management
Policy-based governance , contextual control, guest lifecycle mgmt
Consistent Network-wide Security
Compliance including 802.1X ports, untrusted device access denial
Technology
© 2010 Cisco and/or its affiliates. All rights reserved.
Utility
Energy
Healthcare
Higher Ed
Secondary Ed
Cisco Confidential
7
Getting BYOD Devices On-Net Without Wasting Their Time
BYOD On-Boarding
Zero-touch portal automates identity, profiling & provisioning to a users identity to get them
Zero
touch registration
& provisioning
of employee/guest devices
quickly
& securely
on-net while saving
IT time.
Allowing Users To Safely Go Where They Are Allowed To Go -- From Anywhere
Unified
Policy-based Management
Visibility & contextual control across the network while blocking untrusted access --
, contextual
control,
guest
lifecycle mgmt
userPolicy-based
authentication, governance
device profiling,
posture, location,
access
method
Applying
Network Network-wide
Policy to Users from
Entry to Destination (E2E)
Consistent
Security
Control
plane fromincluding
access layer802.1X
thru data
centeruntrusted
that is topology
independent
Compliance
ports,
device
access denial
Policy platform for unified access, DC switches & FWs with ecosystem APIs
Technology
© 2010 Cisco and/or its affiliates. All rights reserved.
Utility
Energy
Healthcare
Higher Ed
Secondary Ed
Cisco Confidential
8
Policy
Management
Identity Services Engine (ISE)
Policy
Information
Policy
Enforcement
User Directory
Prime Infrastructure
Profiling from Cisco Infrastructure
,
Posture from NAC/AnyConnect
Agent
Cisco Infrastructure: Switches, Wireless Controllers, Firewalls, Routers
Policy
Context
User Identity
© 2010 Cisco and/or its affiliates. All rights reserved.
Personal Devices
Corporate Assets
Non-User Devices
Cisco Confidential
9
Policy Management
Solution
Unified Network
Access Control
Turnkey BYOD
Solution
1st System-wide Solution
Deep network integration
System-wide Policy
Control from One Screen
Best Product in Cisco!
12 Cisco Pioneer Award
Over 400 Trained &
Trusted ATP Partners
Over 1,000 Wins – Year 1
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
10
One Network
I only want to allow the right users
and devices on my network
Authentication
Services
I want user and devices
to receive appropriate network services
Authorization
Services
I want to allow guests into the network
and control their behavior
Guest Lifecycle
Management
One Policy
I need to allow/deny iPads in my
network (BYOD)
I want to ensure that devices on my
network are clean
I need a scalable way of enforcing
access policy across the network
Profiling and BYOD
Services
Posture
Services
TrustSec SGA
One Management
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
11
© 2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
12
Reduced
Burden on
IT Staff
Reduced
Burden on Help
Desk Staff
Intuitive
Management
for End Users
© 2011 Cisco and/or its affiliates. All rights reserved.
•  Device On-boarding
•  Self Registration
•  Certificate and Supplicant
Provisioning
•  Seamless intuitive end
user experience
•  Support Windows,
MAC OS X, iOS, Android
•  My Devices Portal—
register, blacklist, manage
•  Guest Sponsorship Portal
Cisco Confidential
13
The New Way
Coming Soon
Best Practice Today
Best Practice (~CY13 Q2)
ISE
MDM
ISE & MDM Integrate
Device Access Control
Mobile Device Security Control
Enforced Mobile Device Compliance
Device Identity
Device Compliance
BYOD On-boarding
Mobile Application
Management
Device Access Control
Data Security Controls
Forces on-boarding to MDM
with personal devices used
for work
Register but restrict access
for personal devices not
managed by MDM
Quarantine non-compliant
devices based on MDM policy
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
14
•  User connects to
Secure SSID
•  PEAP: Username/
Password
•  Redirected to
Provisioning Portal
Personal Asset
BYOD-Secure
Access Point
•  User registers device
Downloads Certificate
Downloads Supplicant Config
Wireless
LAN Controller
•  User reconnects using
EAP-TLS
ISE
© 2010 Cisco and/or its affiliates. All rights reserved.
AD/LDAP
Cisco Confidential
15
•  User connects to
Open SSID
•  Redirected to
WebAuth portal
•  User enters employee
or guest credentials
Personal Asset
BYOD-Secure
BYOD-Open
•  Guest signs AUP and
Access Point
gets Guest access
•  Employee registers device
Wireless
LAN Controller
Downloads Certificate
Downloads Supplicant Config
•  Employee reconnects
using EAP-TLS
ISE
© 2010 Cisco and/or its affiliates. All rights reserved.
AD/LDAP
Cisco Confidential
16
Any
Device
General Web
Server
User and Device Role
Registered
Device
Employee
News Portal
Manager
Portal
Corporate
Device
Employee
Time Card
Application
Credit Card
Server
Unregistered Device
Employee
Management
Credit Card Scanners
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
17
Any
Device
User and Device Role
Unregistered Device
Employee
Management
Credit Card Scanners
© 2010 Cisco and/or its affiliates. All rights reserved.
Policy Definition
General
Web Server
Registered Device
Employee
News
Portal
Manager
Portal
Employee
Time Card
Application
Corporate
Device
Credit Card
Server
Public SSID
Corporate SSID
Member of group Employee
Certificate matches endpoint
Corporate SSID
Member of group Employee and
Manager
Certificate matches endpoint
Credit_Card SSID
Member of group Credit_Scanners
Profiled as iphone
Cisco Confidential
18
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
19
SSID Access:
Corporate-wifi
Employee
Registered
AD Group:
Management
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
20
Profiled as an
iPhone
Certificate
Required
SSID Access:
cc-secure-wifi
AD Group:
Credit Card Scanners
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
21
VLAN Architecture
Scaling Concerns
Highly topology dependent
ACL Architecture
Hard to Maintain
100s-1000s of ACEs
802.1X
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
22
User and Device Role
Ingress Tag
Unregistered Device
(Unregist_Dev_SGT)
Employee
(Employee_SGT)
Management
(Management_SGT)
Credit Card Scanners
(CC_Scanner_SGT)
SGA TAG - Policy
Public SSID
who
what
where
Corporate SSID
Member of group Employee
Certificate matches endpoint
when
how
Cisco ISE
Corporate SSID
Member of group Employee and Manager
Certificate matches endpoint
Credit_Card SSID
Member of group Credit_Scanners
Profiled as iphone
Finance
Employee
Manager
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
23
Access controls defined using meaningful groups and roles (e.g. user role, server function)
Resources/assets can be mapped dynamically into Security Groups as they are identified.
Grouping resources with common permissions simplifies management
How these asset groups can communicate may then be defined in rules permitting ports/
protocols passed between the Security Groups (Security Group ACLs )
User / system roles Security Group
User
x10
0
VDI user
groups
Security Group
Role A
(SGT10)
Role B
(SGT20)
Prod
(SGT400)
SGACL
Developers
(SGT30)
Dev
(SGT500)
PCI
(SGT600)
Storage
© 2012 Cisco and/or its affiliates. All rights reserved.
System roles
kregan@cisco.com
Cisco Confidential
24
•  TrustSec SGA provides scalable access control by tagging traffic with Security Group Tags
•  These tags represent logical groups of users and/or servers sharing similar sets of privileges
or roles
•  Allows intelligent ACLs to be utilised on switches (SG-ACLs)
•  Sec Group classification can also be used to simplify/automate Firewall rules (SG-FW)
Individuals
Individual Servers
Data Centre
Sample
Logical Security Groups
Sample
Logical Security Groups
Employee
In this example
source entities are
reduced from 46 to 4
Partner
Company
Confidential
SG-ACL
NDA
Confidential
In this example
destination entities
are reduced from 60
to 4
Contractor
Example Access Policy Simplification
Sensitive
Guest
Unknown
Before - 46 (source IPs) x 60 (dest IPs) x 4 TCP/UDP Port Permissions = 11040 ACE/ACLs
After - 4 (source SGTs) x 4 (dest SGs) x 4 TCP/UDP Port Permissions = 64 SGACLs
General Access
© 2012 Cisco and/or its affiliates. All rights reserved.
kregan@cisco.com
Cisco Confidential
25
Egress Policy Table
Source Security Group (Tag value)
Destination Security Group (Tag
value)
SGACLs
Detective (10)
Criminal Records Database (111)
CR_Access_Protocols
Image analysis developers (20)
Development Servers(222)
Permit All
Forensic analyst (30)
Forensics database (1000)
Permit All
permit tcp dst eq 443
permit tcp dst eq 80
permit tcp dst eq 22
permit tcp dst eq 3389
permit tcp dst eq 135
permit tcp dst eq 136
permit tcp dst eq 137
permit tcp dst eq 138
permit tcp des eq 139
deny ip
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
26
•  No IP addresses in
ACE
© 2012 Cisco and/or its affiliates. All rights reserved.
kregan@cisco.com
Cisco Confidential
27
Egress Policy Matrix
SRC \ DST
C Records (111)
Development
Servers
Forensics DB (222)
Detective (10)
Permit all
Deny All
SGACL-B
Image Analysis
Developers (20)
Deny All
Permit All
Deny All
Forensics Analyst
(20)
Deny all
Deny All
SGACL-C
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
28
Protecting compliance-critical assets in the DC
•  Controlled access to compliance-critical systems like servers processing
credit-card data
User role + Host Posture + Location
•  Reducing the scope of compliance controls through tag-based
segmentation
•  Rules defined in compliance terms and audit needs (not IP addresses etc)
e.g. Trading applications accessible only from regulated trading floor
environments
e.g. unmanaged devices cannot access compliance-critical servers
Extranet: Marking traffic from specific external user groups
•  Offshore development partners access Development Servers only, not
Production services
© 2012 Cisco and/or its affiliates. All rights reserved.
kregan@cisco.com
Cisco Confidential
29
Egress Policy Enforcement
§  Security Group ACL
HR Server Zone
Campus
Network
Users,
Endpoints
Production
Trading
Services
Catalyst® Switches
(3K/4K/6K)
Ingress classification
Nexus® 7000
SGT=10 (HR user)
Development Systems
ISE
Group-based rules defined for users - server functional groups:
Source Security Group (Tag value)
Destination Security Group (Tag value)
SGACLs
HR (10)
HR Server Zone (111)
HR_Access_Protocols
Offshore developers (20)
Development Servers(222)
Permit All Protocols
Trading group (30)
Production trading (1000)
Permit All Protocols
© 2012 Cisco and/or its affiliates. All rights reserved.
kregan@cisco.com
Cisco Confidential
30
§  Unique 16 bit (64K) tag assigned to unique role
Security
Group
Tag
§  Tag = privilege of the source user, device, or
entity
§  Tagged at ingress of TrustSec domain
§  Filtered at egress of TrustSec domain (by an SG-ACL)
SGACL
SG
§  No IP address required in ACE (IP address is bound to
SGT)
§  Policy (ACL) is distributed from central server
§  Provides topology
independent policy
§  Flexible and scalable policy based on user role
§  Centralised Policy Management for Dynamic policy provisioning
© 2012 Cisco and/or its affiliates. All rights reserved.
kregan@cisco.com
Cisco Confidential
31
Authenticated
Encrypted
DMAC
SMAC
802.1AE Header
CMD EtherType
802.1Q
Version Length
CMD
ETYPE
SGT Opt Type
ICV
PAYLOAD
SGT Value
CRC
Other CMD Options
Cisco Meta Data
Ethernet Frame field
§ 
802.1AE Header
CMD
ICV
are the L2 802.1AE + TrustSec overhead
§  Frame is always tagged at ingress port of SGT capable device
§  Tagging process prior to other L2 service such as QoS
§  No impact IP MTU/Fragmentation
§  L2 Frame MTU Impact: ~ 40 bytes = less than baby giant frame (~1600
bytes with 1552 bytes MTU)
© 2012 Cisco and/or its affiliates. All rights reserved.
kregan@cisco.com
Cisco Confidential
32
Employee TAG
Manager TAG
Credit Card
Scanner TAG
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
33
Manager TAG
© 2010 Cisco and/or its affiliates. All rights reserved.
Credit Card
Scanner TAG
Cisco Confidential
34
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
35
© 2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
36
SGT = 100
SRC\DST
Time card
Credit card
Manager
(100)
Access
No access
SGACL
I registered my device
I m a manager
Time Card (SGT=4)
Credit card
scanner (SGT=10)
Manager
SGT = 100
Cisco ISE
Security Group Based Access Control
•  ISE maps tags (SGT) with user identity
•  ISE Authorization policy pushes SGT to ingress NAD ( switch/WLC)
•  ISE Authorization policy pushes ACL (SGACL) to egress NAD (ASA or Nexus)
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
37
Cisco
Innovation
IP Address
SGT
10.1.100.3
100
SXP
SRC\DST
Time card
Credit card
Manager
(100)
Access
No access
SGACL
I registered my device
I m a manager
Time Card (SGT=4)
Credit card
scanner (SGT=10)
10.1.100.3
Manager
SGT = 100
Cisco ISE
Security Group Access Protocol
For transport through a non SGT core
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
38
Cisco
Innovation
Assign SGT to
Users / Devices
Transport SGT
across Network
(Inline/SXP)
Enforce Policy
based on SGT
(SGACL/SGFW)
Catalyst 2K
Catalyst 3K
Catalyst 4K
Catalyst 6K
WLC 7.2
Nexus 7K
Nexus 5K
Cat 6K Sup720 (SXP)
Cat 2K-S (SXP)
N7K (SXP/SGT)
Cat 3K (SXP)
N5K (SGT)
Cat 3K-X (SXP/SGT)
N1Kv (SXP) - Q4CY12
Cat 4K (SXP)
Cat 6K Sup2T (SXP/SGT)
N7K / N5K
(SGACL)
Cat6K
(SGACL)
Cat3K-X
(SGACL)
ASR1K (SXP/SGT)
ISR G2 (SXP)
WLC 7.2 (SXP)
ASA (SXP) - CY12 2H
ASA (SGFW)
- CY12 2H
Blue: ~2011
© 2010 Cisco and/or its affiliates. All rights reserved.
Nexus 1Kv
(Q4CY12)
ASR1K/ISRG2
(SGFW)
Red: 2012~
Cisco Confidential
39
Cisco
Innovation
a
Identity Differentiators
Authentication Features
Monitor Mode
Cisco Catalyst Switch
•  Unobstructed access
•  No impact on productivity
•  Gain visibility
Flexible Authentication Sequence
•  Enables single configuration for most use cases
•  Flexible fallback mechanism and policies
Rich and Robust 802.1X
IP Telephony Support for
Virtual Desktop Environments
•  Single host mode
•  Multihost mode
•  Multiauth mode
Authorized
Users
802.1X
Tablets
IP Phones
MAB
Network
Device
Guests
WebAuth
•  Multidomain authentication
Critical Data/Voice Authentication
•  Business continuity in case of failure
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
40
Device Sensor
Cisco
Innovation
Automated Device Classification Using Cisco Infrastructure
DEVICE PROFILING
CDP
LLDP
DHCP
MAC
Supported Platforms:
IOS 15.0(1)SE1 for Cat 3K
IOS 15.1(1)SG for Cat 4K
WLC 7.2 MR1 - DHCP data only
ISE 1.1.1
For wired and wireless networks
POLICY
Printer
ISE
Personal iPad
Access Point
Printer Policy
[place on VLAN X]
CDP
LLDP
DHCP
MAC
[restricted access]
Access
Point
`
The Solution
Efficient Device
Classification
Leveraging
© 2010 Cisco and/or itsInfrastructure
affiliates. All rights reserved.
Personal
iPad Policy
CDP
LLDP
DHCP
MAC
DEPLOYMENT SCENARIO WITH CISCO DEVICE SENSORS
COLLECTION
Switch Collects Device
Related Data and Sends
Report to ISE
CLASSIFICATION
ISE Classifies Device, Collects
Flow Information and Provides
Device Usage Report
AUTHORIZATION
ISE Executes Policy Based
on User and Device
Cisco Confidential
41
ISE Profiling
Probe Type
Info Provided
RADIUS
(Calling-Station-ID)
MAC Address (OUI)
Example: 0A:1B:2C = vendor X
DHCP
(host-name)
(dhcp-class-identifier)
Hostname (default may include device type)
Example: jsmith-ipad
Device class / type
Examples: BlackBerry, Cisco wireless IP phone
DNS
(reverse IP lookup)
FQDN (default hostname may include device type)
Example: jsmith-ipad.company.com
HTTP
(User-Agent)
Details on specific mobile device type
Examples: iPad, iPhone, iPod, Android, Win7
NMAP Scan
(SNMPPortsAndOS-scan )
Trigger endpoint scan for OS
Example: OS= Apple iOS
SNMP Trap/Query
(MAC Notification/CDP/LLDP
collection)
MAC Address/Interface Data, Session Data and System Query
Examples: 0A:1B:2C/ARP table
Netflow
(Capture flows)
Capture flows to match endpoint quintuple traffic
Examples: SRC/DST IP/Port/Protocol
RADIUS Accounting provides MAC:IP binding to support other probes that rely on IP address (DNS,
NetFlow, NMAP, and HTTP)
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
42
•  Catalyst 6K Supervisor 2T
ü  Layer 3 SGT
•  Cisco WLC 7.2 (WLC
7500/5500/2500)
ü  VLAN to SGT mapping
ü  SXP support
ü  Subnet to SGT Mapping
ü  MACsec
ü  RADIUS CoA on Open SSIDs
ü  BYOD support
ü  MACsec over EoMPLS
ü  Device Sensor (DHCP)
ü  Native Security Group Tagging
ü  FlexConnect enhancements
ü  Advanced Identity features
•  Catalyst 4K Supervisor 7E
ü  Advanced Identity Features
ü  MACSEC (switch-to-switch and switch-client)
ü  Device Sensor
•  Catalyst 3K-X
ü  Advanced Identity features
ü  Native Security Group Tagging
ü  Device Sensor
ü  MACSEC (switch-to-switch and switch-client)
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
43
© 2012 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
44
Tying it All Together
Contextual Access Control
User
© 2010 Cisco and/or its affiliates. All rights reserved.
Device Type Location
Posture
Time
Access Method Custom
Cisco Confidential
45
BYOD
•  User Self Onboarding
•  MDM Vendor Partnerships
Access Control
•  Context: Who/What/How/Where
•  Visibility: Profiling
Holistic Solution
•  SGA: Topology independent, Business language
•  Enforcement: Router/Switch/Controller feature
•  Endpoint: Posture, VPN
•  Info stores: AD, LDAP, DHCP, MDM
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
46
•  ISE Information:
http://www.cisco.com/go/ise
•  Cisco TrustSec (SGA and certified solutions):
www.cisco.com/go/trustsec
•  Application Notes and How-To Guides:
http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns744/
landing_DesignZone_TrustSec.html
•  Design Zone – BYOD Reference Design
http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns743/
ns1050/own_device.html#~overview
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
47
•  ATP Program Site:
http://www.cisco.com/web/partners/partner_with_cisco/
channel_partner_program/resale/atp/ise.html
•  Partner Security Home Page:
https://communities.cisco.com/community/partner/borderlessnetworks/
security
•  ATP Partner Resource Center (for certified Partners)
http://www.ciscosecurityatp.com/login.asp?strReturn=/index.asp
© 2010 Cisco and/or its affiliates. All rights reserved.
Cisco Confidential
48