Internet Security 1 (IntSi1) 14 Network Access Control Prof. Dr. Andreas Steffen Institute for Internet Technologies and Applications (ITA) Andreas Steffen, 19.12.2011, 14-NAC.pptx 1 Internet Security 1 (IntSi1) 14.1 Firewalls The Traditional Way Andreas Steffen, 19.12.2011, 14-NAC.pptx 2 Castle Defences: A Cascade of Security Zones Keep Last building in castle to fall Inner Perimeter Stronghold, higher walls create a containment area between Inner & Outer Perimeters Moat / Main Gate Outer perimeter controlling castle access Andreas Steffen, 19.12.2011, 14-NAC.pptx 3 Network Defences: A Cascade of Security Zones Outer Perimeter Inner Perimeter Stronghold Keep Internal Firewall Internet De-Militarized Zone (DMZ) Internal Network (Intranet) Mission Critical Systems Andreas Steffen, 19.12.2011, 14-NAC.pptx 4 Transport Layer Network Layer Application Level Proxies Circuit Level Proxies Packet Filter Application Gateways (Proxy) Packet Filtering Firewall Secure Router (Screening Router) Stateful Inspection Engines Application Layer (e.g. TCP SYN, ACK, FIN states) Firewalls can control traffic at various OSI layers Andreas Steffen, 19.12.2011, 14-NAC.pptx 5 How to Protect against Trojan Horses? Andreas Steffen, 19.12.2011, 14-NAC.pptx 6 Internet Security 1 (IntSi1) 14.2 Network Access Control The Modern Way Andreas Steffen, 19.12.2011, 14-NAC.pptx 7 Network Access Control (NAC) • User Authentication • Layer 2: IEEE 802.1X (switches and WLAN access points) • Layer 3: VPN (IKEv2, proprietary e.g. TLS-based methods) • Configuration Assessment • Configuration measurement before network access is granted (e.g. installed software like antivirus scanner and firewall) • Compare measurements to network access policies Integrity check of computer platform • Re-assess computer platforms in regular intervals • Policy Enforcement • Enforce security policies onto no-compliant computer platforms Source: Jörg Vieweg, FH Hannover Andreas Steffen, 19.12.2011, 14-NAC.pptx 8 Network Access Control (NAC) allow NAC Policy Enforcement Point NAC Network NAC Server block isolate Computer with NAC Client Policy Manager Remediation Server Isolation Network Source: Jörg Vieweg, FH Hannover Andreas Steffen, 19.12.2011, 14-NAC.pptx 9 NAC Compatibility Issues • Proprietary Solutions • • • • • • Cisco - Network Admission Control (NAC) Microsoft - Network Access Protection (NAP) Juniper - Unified Access Control (UAC) HP - ProCurve Access Control Security Solution Still Secure - Safe Access Emerging Standards • Trusted Computing Group (TCG) - Trusted Network Connect (TNC) • IETF - Network Endpoint Assessment (NEA) • Open Source Implementations • • • • XSupplicant - IEEE 802.1X NAC Client/PEP, supports TCG TNC & NEA wpa_supplicant - IEEE 802.1X NAC Client/PEP, supports TCG TNC TNC@FHH - FreeRADIUS-based NAC Server, implements TCG TNC strongSwan - IKEv2 NAC Client/PEP/Server, supports TCG TNC & NEA Andreas Steffen, 19.12.2011, 14-NAC.pptx 10 Microsoft Network Access Protection (NAP) • Introduced with Windows Vista / Server 2008 • Statement of Health (SoH) protocol • VPN access via dynamic issue of Statement of Health Certificates Andreas Steffen, 19.12.2011, 14-NAC.pptx 11 Microsoft Network Access Protection (NAP) Andreas Steffen, 19.12.2011, 14-NAC.pptx 12 Internet Security 1 (IntSi1) 14.3 Trusted Network Connect Andreas Steffen, 19.12.2011, 14-NAC.pptx 13 Trusted Network Connect (TNC) Andreas Steffen, 19.12.2011, 14-NAC.pptx 14 IKEv2 with EAP & Server Certificate Initiator UDP/500 KEi Client IDi Ni Nr Responder RADIUS Server AAA Server KEr IDr PSK IDr EAP Identity EAP Response Certr Authr EAP Challenge PSK Andreas Steffen, 19.12.2011, 14-NAC.pptx 15 Trusted Network Connect Standards • RFC 5209 Network Endpoint Assessment (NEA), June 2008 • Overview and Requirements • RFC 5792 PA-TNC, March 2010 • A Posture Attribute Protocol Compatible with Trusted Network Connect • IETF RFC is compatible with TCG standard TNC IF-M 1.0 • RFC 5793 PB-TNC, March 2010 • A Posture Broker Protocol Compatible with Trusted Network Connect • IETF RFC is compatible with TCG standard TNC IF-TNCCS 2.0 • TCG Standard TNC IF-TNCCS 1.1, February 2007 • Previous standard based on XML-coded messages • TCG Standard TNC IF-TNCCS SoH 1.0, May 2007 • Compatible to Microsoft‘s Statement of Health (SoH) protocol Andreas Steffen, 19.12.2011, 14-NAC.pptx 16 Network Endpoint Assessment (NEA) Posture Posture Posture Collectors Collectors Collectors PA (1 .. N) (1(1....N)N) Posture Broker PB NEA Client Posture Broker Server Posture Posture Posture Clients Clients Clients (1 .. K) (1(1....K)K) Collectors Collectors Validators (1 .. N) (1(1....N)N) Client Transport Transport Transport Posture Posture Posture Posture Posture Posture PT Transport Transport Transport Clients Clients Servers (1 .. K) (1(1....K)K) NEA Server Andreas Steffen, 19.12.2011, 14-NAC.pptx 17 PB-TNC / IF-TNCCS 2.0 State Machine Exchange of PA-TNC Client/Server Batches containing PA-TNC Messages Andreas Steffen, 19.12.2011, 14-NAC.pptx 18 How to Protect against Cyber Attacks? Andreas Steffen, 19.12.2011, 14-NAC.pptx 19 Internet Security 1 (IntSi1) 14.4 Metadata Access Point Andreas Steffen, 19.12.2011, 14-NAC.pptx 20 Traditional Approach: A Network of Silos Source: infoblox Andreas Steffen, 19.12.2011, 14-NAC.pptx 21 New Approach: Centralized MAP Service Source: infoblox Andreas Steffen, 19.12.2011, 14-NAC.pptx 22 Extended TNC Architecture Andreas Steffen, 19.12.2011, 14-NAC.pptx 23 IF-MAP Metadata for Network Security macaddress= 00:11:22:3 3:44:55 identity = john.smith access-request-mac ip-mac role=finance and employee authenticated-as layer2-information VLAN=1234 Port=12 accessrequest = 111:33 authenticated-by device = 111:4 device = 111:0 device-ip device-ip ip-address = 192.0.2.55 ip-address = 10.0.0.6 capability = accessfinanceserverallowed device-attribute = anti-virus-running ip-address = 192.0.2.7 • • access-requestdevice Metadata for Industrial Control Systems Metadata for Cloud Computing device = 111:55 Source: TCG Andreas Steffen, 19.12.2011, 14-NAC.pptx 24 IF-MAP is a SOAP 1.2 over HTTPS Interface <?xml version="1.0"?> <env:Envelope xmlns:env="http://www.w3.org/2003/05/soap-envelope" xmlns:ifmap="http://www.trustedcomputinggroup.org/2010/IFMAP/2" xmlns:meta="http://www.trustedcomputinggroup.org/2010/IFMAP-METADATA/2"> <env:Body> <ifmap:publish session-id="222"> <update> <access-request name="111:33"/> <device> <name>111:4</name> </device> <metadata> <meta:layer2-information ifmap-cardinality="multiValue"> <vlan>1234</vlan> <port>12</port> </meta:layer2-information> </metadata> </update> </ifmap:publish> </env:Body> </env:Envelope> Source: TCG Andreas Steffen, 19.12.2011, 14-NAC.pptx 25 Commercial TNC IF-MAP Products Juniper IC6500 Unified Access Control (UAC) Appliance (Policy Server) as IF-MAP Client • • • Enterasys Network Management System Great Bay Software Beacon System LogiSense EngageIP Lumeta IPsonar as IF-MAP Client Infoblox 1852 IF-MAP Orchestration Server Andreas Steffen, 19.12.2011, 14-NAC.pptx 26 Open Source TNC IF-MAP Products MAP-Client IRON Projekt der FH Hannover (MAP-Server) Andreas Steffen, 19.12.2011, 14-NAC.pptx 27 Internet Security 1 (IntSi1) What about Lying Endpoints? Andreas Steffen, 19.12.2011, 14-NAC.pptx 28 Internet Security 2 (IntSi2) – coming soon ! Trusted Platform Module (TPM) Sanitized Network ? Internet Untrusted Host • Security Gateway Host access to sanitized network only after successful Network Endpoint Assessment (NEA) using Trusted Network Connect (TNC). Andreas Steffen, 19.12.2011, 14-NAC.pptx 29