25
Joel Snyder Senior Partner, Opus One [email protected] Network Access Control: A Whirlwind Tour Through The Basics

Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

  • Upload
    vodan

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Joel SnyderSenior Partner, Opus One

[email protected]

Network Access Control:A Whirlwind Tour Through The Basics

Page 2: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Agenda: Defining NAC

Why are we thinking about NAC?

What is a definition of NAC?

What are the four key components of NAC?

What are the industry NAC architectures?

Authentication, Environment, and Enforcement in Depth

Page 3: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Security Management Is Moving Towards the EndUser

Last Year

Poke holes in the firewall for specificIP addresses and specific services

Create IPsec remote accesssolutions that give broad networkaccess

Next Year

Determine security policy by who isconnecting not where they areconnecting from

Create remote access solutions thatfocus on the end-user, not thenetwork

Page 4: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

The Marketing View of NAC

TheInternet

CorporateNet

Page 5: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Let’s Define NAC:“Network Access Control”

NAC is user-focused, network-based access control

Who you are:not your IP address,but your authenticatedidentity.

Also: your end-pointsecurity status,location, access type Control: limit

access according topolicy, where policyis based on theuser

Something insideof the network:enforcementoccurs in thenetwork, not onthe the end points

Page 6: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

“OK, wait a second. Isn’t Access Control what afirewall does?”

You shall notpass!

Internet

Absolutely!

The difference is in the decision!

Page 7: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

NAC Is Firewalling, butWith a Difference

Common FirewallDecision Elements

Source IP and portDestination IP and port

Position

Between two networks

Common NAC Decision Elements

Username and GroupAccess method and locationEnd-point security status

Position

Between user and network

Page 8: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

NAC Has Four Components

1. Authentication of theuser

Authenticate

End users areauthenticated beforegetting networkaccess

#1: Authenticate

Page 9: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

How Does the Authentication Actually Work?

TheInternet

Corporate Net

NAC PolicyServer

Three options are common

802.1X

Web-based Authentication

Proprietary Client

#1: Authenticate

Page 10: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

802.1X is Preferred and the Most SecureApproach

Internet

CorporateNet

NACPolicyServer

If authentication (and other stuff) is successful, policy server instructsedge device to grant appropriate access. User gets IP address.

User authenticates to central policy server AP/Switch starts 802.1X (EAP) for authentication

User brings up link (or associates with AP)

#1: Authenticate

Page 11: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Web Authentication is Easy to Do

Internet

CorporateNet

NACPolicyServer

If authentication (and other stuff) is successful, portal lets trafficthrough or reconfigures network to get out of the way

User authenticates to central policy server User opens web browser and is trapped by portal

User gets on network; gets IP address

#1: Authenticate

Page 12: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Environmental Information ModifiesAccess or Causes Remediation

2. Useenvironmentalinformation aspart of policydecision making

Environment

Where is the user comingfrom ?

When is the accessrequest occurring?

What is the End PointSecurity posture of theend point?

1. Authentication of theuser

Authenticate

#2: Environment

Page 13: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Environmental InformationCan Include Lots of Things

Pure Environment

Access Method (wired, wireless, VPN)

Time of Day/Day of Week/Date withinLimits

Client Platform (Mac, Windows, etc.)

Authentication Method (user/pass,MAC, etc.)

End Point Security

Does the device comply to my policyregarding

η Security Tools (A/V, FW)

η Applications (running/not)

η Patch Level

η Corporate “signature”

This is the “(and other stuff)” part

For some, this is themain reason to want

NAC!

#2: Environment

Page 14: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Key Concept: Access Is a Function ofAuthentication and user-focused Environment

Whatyou can

do=

Who You Are

Where You AreComing From

How Well YouComply with

Policy

+

+

Darn… We just summarizedNAC in one slide. What elseis there to talk about?

#2: Environment

Page 15: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Access Controls Define Capabilitiesand Restrict the User

3. Control usagebased oncapabilities ofhardware andsecurity policy

Allow or deny access.

Put the user on a VLAN.

Send user to remediation.

Apply ACLs or firewall rules.

2. Useenvironmentalinformation aspart of policydecision making

Environment

1. Authentication of theuser

Authenticate Access Control

#3: Access Control

Page 16: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Access Control Enforcement HasTwo Main Attributes to Understand

Control Granularity

On/Off the network

VLAN-level assignment

Packet filters

Stateful firewall

Control Location

On the client itself

At the edge of the network

A barrier between user and network

Deep within the network core

At the server itself

#3: Access Control

Page 17: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Granularity is a Spectrum LargelyDetermined by Hardware

Most granular,most secure, mostpowerful

Least granular,least powerful

Stateful FullFirewall

BasicPacketFilters

VLANAssignment

Go/No-GoDecision

Joel’s Fantasy of HowSecure Networks Are Run

Likely Reality for Next FewYears

Typical Current Approach(and likely SMB approachin future)

#3: Access Control

Page 18: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Management of Policy is the Weak Linkin most NAC Solutions

4. Manage it all

Usable management andcross-platform NACnormalization

3. Control usagebased oncapabilities ofhardware andsecurity policy

2. Useenvironmentalinformation aspart of policydecision making

1. Authentication of theuser

Environment

Authenticate Access Control

Management

#4: Management

Page 19: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

An Architecture Helps to Understand NAC Better

TheInternet

CorporateNet

NAC

PolicyServer

Page 20: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Lots of NAC Products… but Only a FewGood Architectures

ClientBroker

NetworkAccessRequestor

NetworkAccessAuthority

ServerBroker

PostureValidator

PostureCollector

NetworkEnforcementPoint

These are the IETF terms for eachpiece. TCG/TNC, Microsoft, andCisco all have their own similar ones

Network EndpointAssessment Client

Network EndpointAssessment Server

Page 21: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

ClientBroker

NetworkAccessRequestor

NetworkAccessAuthority

ServerBroker

PostureValidator

PostureCollector

NetworkEnforcementPoint

NetworkAccessDevice

NAP EnforcementServer

Policy EnforcementPoint

Network Enforcement Point Component within the network thatenforces policy, typically an 802.1X-capable switch or WLAN, VPNgateway, or firewall.

Cisco NACMicrosoft NAPTCG TNCWhat is it?

Network Enforcement Pointenforces access controls

HiddenSlide

Page 22: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

ClientBroker

NetworkAccessRequestor

NetworkAccessAuthority

ServerBroker

PostureValidator

PostureCollector

NetworkEnforcementPoint

CiscoTrustAgent

NAPAgent

TNCClient

Client Broker "Middleware" that talks to the Posture Collectors,collecting their data, and passes it down to Network AccessRequestor

CiscoTrustAgent

NAP EnforcementClient

Network AccessRequestor

Network Access Requestor Connects the client to network, suchas 802.1X supplicant. Authenticates the user, and acts as a conduitfor Posture Collector data

Posture Plug-in Apps

SystemHealthAgent

IntegrityMeasurementCollector

Posture Collector Third-party software that runs on the client andcollects information on security status and applications, such as 'isA/V enabled and up-to-date?'

Cisco NACMicrosoft NAPTCG TNCWhat is it?

Network Endpoint Assessment Client connectsto network and sends over posture status

HiddenSlide

Page 23: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

ClientBroker

NetworkAccessRequestor

NetworkAccessAuthority

ServerBroker

PostureValidator

PostureCollector

NetworkEnforcementPoint

PolicyVendorServer

SystemHealth Validator

IntegrityMeasurement Verifier

Posture Validator Receives status information from PostureCollectors then validates it against policy, returning a status to theServer Broker

AccessControlServer

NAP AdministrationServer

TNCServer

Server Broker "Middleware" acting as an interface betweenmultiple Posture Validators and the Network Access Authority

AccessControlServer

NetworkPolicyServer

Network AccessAuthority

Network Access Authority Validates authentication and posture,then passing policy to the Network Enforcement Point.

Cisco NACMicrosoft NAPTCG TNCWhat is it?

http://www.networkworld.com/research/2006/040306-nac-overview.html

Network Endpoint Assessment Serverauthenticates user and determines policy

HiddenSlide

Page 24: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

We’ve Just Grazed the Surface of NAC

NAC needs to be on your radar

Tools like 802.1X should be part of your shortand long range plans anyway

Don’t jump into a proprietary solution withoutconsidering the emerging standard architectures

Page 25: Network Access Control: A Whirlwind Tour Through …opus1.com/www/presentations/nac-whirlwind.pdfNetwork Access Control: A Whirlwind Tour Through The Basics Agenda: Defining NAC Why

Joel SnyderSenior Partner, Opus One

[email protected]

Thank You