Deploying Wired 802.1X
Deploying Wired 802.1X
1X
BRKSEC-2005
Presentation_ID
Cisco Public
Housekeeping
We value your feedback- don't forget to complete your online session evaluations after each session & complete the Overall Conference Evaluation which will be available online from Thursday Visit the World of Solutions Please remember this is a 'non-smoking' venue! Please switch off your mobile phones Please make use of the recycling bins provided Please remember to wear your badge at all times including the Party
BRKSEC-2005
Cisco Public
Session Objective
Understand base 802.1X concepts Learn the benefits of deploying 802.1X Learn how to configure and deploy 802.1X Learn lessons on how to make it work when you get back to your lab
BRKSEC-2005
Cisco Public
Agenda
802.1X and Wired Access Default Functionality Deployment Considerations Reporting and Monitoring Looking Forward Deployment Case Study
BRKSEC-2005
Cisco Public
BRKSEC-2005
Cisco Public
BRKSEC-2005
Cisco Public
Email: [email protected]
MAC Address: 00-0c-14-a4-9d-33 IP Address: 10.0.1.199
Digital Certificates
Id Like to Withdraw 200.00 Euros Please. Do You Have Identification? Yes, I Do. Here It Is. Thank You. Heres Your Euros.
BRKSEC-2005
Cisco Public
10
Id Like to Connect to the Network. Identification required Here is my identification Identification verified, access granted!
Identity-Enabled Networking
11
BRKSEC-2005
Cisco Public
Default Functionality
BRKSEC-2005
Cisco Public
12
IEEE 802.1X
Standard set by the IEEE 802.1 working group Is a framework designed to address and provide port-based access control using authentication
802.1X is primarily an encapsulation definition for EAP over IEEE 802 mediaEAPOL (EAP over LAN) is the key protocol
Layer 2 protocol for transporting authentication messages (EAP) between supplicant (user/PC) and authenticator (switch or access point) Assumes a secure connection
BRKSEC-2005
Cisco Public
13
SSC
Layer 3 Layer 2
Authentication Server
IAS / NPS ACS Any IETF RADIUS server
BRKSEC-2005
Cisco Public
14
802.1X Protocols
Supplicant
Authenticator
SSC
Authentication Server
Layer 2
Layer 3
EAP
RADIUS
StoreDependent
BRKSEC-2005
Cisco Public
15
16
802.1X - RADIUS
RADIUS acts as the transport for EAP from the authenticator to the authentication server RFC for how RADIUS should support EAP between authenticator and authentication serverRFC 3579
IP Header UDP Header RADIUS Header EAP Payload
RADIUS is also used to carry policy instructions (authorization) back to the authenticator in the form of AV pairs
AV Pairs
IP Header
UDP Header
RADIUS Header
EAP Payload
Usage guideline for 802.1X authenticators use of RADIUS - RFC 3580 AV Pairs : Attribute-Values Pairs.
BRKSEC-2005
Cisco Public
19
Port Unauthorized
Cisco IOS
aaa new-model aaa authentication dot1x default group radius aaa authorization network default group radius radius-server host 10.100.100.100 radius-server key cisco123 dot1x system-auth-control interface GigabitEthernet1/0/1 authentication port-control auto dot1x pae authenticator
BRKSEC-2005
Cisco Public
20
A Closer Look:
802.1X
SSC
EAP-Auth Exchange
EAP-Success EAPOL-Logoff
Port Authorized
BRKSEC-2005
Cisco Public
?
USER
One Physical Port ->Two Virtual ports Uncontrolled port (EAPoL only) Controlled port (everything else)
24
?
Authenticated User: Sally
Default authorization is on or off. Dynamic VLANs or ACLs can be used to customize the user experience.
BRKSEC-2005
Cisco Public
25
Offline
One Physical Port ->Two Virtual ports Uncontrolled port (EAPoL only) Controlled port (everything else)
No EAPoL / No Access
BRKSEC-2005
Cisco Public
26
VM
BRKSEC-2005
Cisco Public
27
Deployment Considerations
BRKSEC-2005
Cisco Public
28
29
BRKSEC-2005
Cisco Public
30
Client
X X X
EAP-Identity-Request D = 01.80.c2.00.00.03
1 2 3 4
EAP-Identity-Request D = 01.80.c2.00.00.03
EAP-Identity-Request D = 01.80.c2.00.00.03 EAP-Success D = 01.80.c2.00.00.03
802.1X Process
Any 802.1X-enabled switchport will send EAPOL-Identity-Request frames on the wire (whether a supplicant is there or not)
A device is only deployed into the guest VLAN based on the lack of response to the switchs EAP-Request-Identity frames (which can be thought of as 802.1X hellos) No further security or authentication to be applied. Its as if the administrator deconfigured 802.1X (i.e. multi-host), and hard-set the port into the specified VLAN 90 Seconds is greater than MSFT DHCP timeout
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
31
X X X ? ?
EAPOL-Request (Identity) D = 01.80.c2.00.00.03 EAPOL-Request (Identity) D = 01.80.c2.00.00.03 EAPOL-Request (Identity) D = 01.80.c2.00.00.03 EAPOL-Timeout Initiate MAB Learn MAC
Dot1x/MAB 1 2 3 4 5
Upon link up 30-seconds 30-seconds 30-seconds Variable
RADIUS
6 7 8
00.0a.95.7f.de.06
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Port Enabled
BRKSEC-2005
Cisco Public
33
NAC Profiler
Query MAC Database After Deploying 802.1X
1) 802.1X times out, switch initiates MAB 2) ACS queries Profiler Database using LDAP 3) Profiler validates MAC address 4) ACS sends MAB success 5) Switch enables port (with optional authorization)
interface range gigE 1/0/1 - 24 switchport access vlan 30 switchport voice vlan 31 authentication port-control auto mab LDAP : 00-18-f8-09-cf-d7 NAC Profiler Server
3
LDAP Success ACS
35
1
00-18-f8-09-cf-d7
2 4
Port Enabled
BRKSEC-2005
Cisco Public
Can be used as a MAB DB using an user object. The username and password will be the mac address of the device.
Many useless objects
Can create a lightweight AD instance for this purpose that can be referred to via LDAP Can use the ieee802Device object class for the MAB data base.
Reduces object count No conflict with complex password policy Windows Server 2003 RC2 and Windows Server 2008
BRKSEC-2005
Cisco Public
36
1 2
802.1X Timeouts Client Initiates ConnectionActivates Port Authentication State Machine Switch Port Filters Traffic Limiting It to HTTP, HTTPS, DNS and DHCP
3
Switch Port Relays DHCP Address from DHCP Server User Starts Web Browser and Initiates Web Connection
5
Switch Port Redirects URL and Presents HTTP Form Prompting for Userid/Pwd User Enters CredentialsThey Are Checked Against RADIUS DB via PAPIf Authenticated Then Switch Port Opened for Normal Network Access
7
BRKSEC-2005
Cisco Public
37
41
EAP-Identity-Exchange
RADIUS-Access-Request RADIUS-Access-Request 4
EAP
EAPOL-Failure
X
SSC
802.1X Supplicant (Client) Authenticator (Switch) RADIUS Authentication Server (AAA/ACS)
* Note: EAPOL-Starts are optional, possibility of EAP-NAK left out intentionally, and EAP exchange dependent on method.
This works great in preventing rogue access to a network! This is a primary reason Enterprises look to deploy 802.1X/Identity Networking! This is also the problem! (How should we provide access to devices that fail?)
BRKSEC-2005
Cisco Public
42
Certificate Expired!
User Unknown!
Employees credentials expire or entered incorrectly As 802.1X becomes more prevalent, more guests will fail auth because they have 802.1X enabled by default. Many enterprises require guests and failed corporate assets get conditional access to the network.
Re-provision credentials through a web proxy or VPN Tunnel Provide guest access through VLAN assignment or web proxy
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
44
EAPOLSuccess
SSC
802.1X Supplicant (Client)
Authenticator (Switch)
interface GigabitE 3/13 authentication port-control auto authentication event fail action authorize vlan 51
On the third consecutive failure, the port is enabled and an EAPOL-Success is transmitted
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
45
2. No Secondary Authentication Mechanism. 3. Auth-Fail VLAN, like Guest VLAN, is a switch-local authorization > centralized policy on AAA server is not enforced 4. Switch and AAA server have conflicting views of network
Access Granted
Auth-fail VLAN
Access Denied
BRKSEC-2005
Cisco Public
46
EAP-Request
SSC
802.1X
Supplicant (Client)
Port is now granted access based on MAB authorization
On 802.1X failure, the port continues to the next authentication method (MAB)
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
47
MAB-Assigned VLAN
BRKSEC-2005
Cisco Public
48
49
EAP-Identity-Exchange
3
EAPOL-Failure
X
Client Switch RADIUS Port is not granting access
BRKSEC-2005
Cisco Public
50
Port authorized
EAP-Success/Failure RADIUS Server comes back -> immediate reinitialize 802.1X State Machine
52
53
Flex-Auth Sequencing
Default Order: 802.1X First
By default, the switch attempts most secure auth method first.
802.1X
802.1X Timeout
MAB
MAB fails
MAB
MAB fails
802.1X
802.1X Timeout
Guest VLAN
Guest VLAN
BRKSEC-2005
Cisco Public
54
MAB
MAB fails
EAPoL-Start Received
MAB passes
802.1X
By default, method sequence determines priority (first method has highest priority).
If MAB has priority, EAPoL-Starts will be ignored if MAB passes.
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
55
56
Untagged 802.3
BRKSEC-2005
Cisco Public
57
Voice
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 15X 17X 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 31X 33X 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 47X
MDA replaces CDP Bypass Supports Cisco & 3rd Party Phones
60
No Supplicant on Phone
CDP EAP
1 2
SSC
6 1) 2) 3) 4) 5)
EAP
Phone learns VVID from CDP (Cisco phone) 802.1X times out Switch initiates MAB ACS returns Access-Accept with Phone VSA. Phone traffic allowed on either VLAN until it sends tagged packet, then only voice VLAN 6) (Asynchronous) PC authenticates using 802.1X or MAB PC traffic allowed on data VLAN only
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
61
MDA in Action
Phone authenticated by MAB PC Authenticated by 802.1X
Either 802.1X or MAB for phone Any combination of 802.1X, MAB, Guest-VLAN, Auth-Fail-VLAN, IAB for PC
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved.
ID-6500a#sho authentication session int g 7/1 Interface: GigabitEthernet7/1 MAC Address: 000f.2322.d9a2 IP Address: 10.6.110.2 User-Name: 00-0F-23-22-D9-A2 Status: Authz Success Domain: VOICE Oper host mode: multi-domain Oper control dir: both Posture Token: Unknown Authorized By: Authentication Server Session timeout: N/A Idle timeout: N/A Common Session ID: 0A00645A0000000102124450 Acct Session ID: 0x00000007 Handle: 0x1D000001 --snip-Interface: GigabitEthernet7/1 MAC Address: 000d.60fc.8bf5 IP Address: 10.6.80.2 User-Name: host/beta-supp Status: Authz Success Domain: DATA Oper host mode: multi-domain Oper control dir: both Posture Token: Healthy Authorized By: Authentication Server Vlan Policy: 80 Session timeout: N/A Idle timeout: N/A Common Session ID: 0A00645A000000020213FF9C Acct Session ID: 0x00000008 Handle: 0x6E000002 Runnable methods list: Method State dot1x Authc Success mab Not run
Cisco Public
62
A
S:0011.2233.4455
1X
B
S:6677.8899.AABB
Security Violation
A
S:0011.2233.4455
S:0011.2233.4455
1X
Security Hole
BRKSEC-2005
Cisco Public
65
SSC
MODE
1X
Caveats:
PC-A Unplugs
Domain Port Status = DATA = UNAUTHORIZED
EAPol-Logoff
Catalyst 3750 SERIES
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 15X 17X 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 31X 33X 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 47X 1 3
1X
PC-B Plugs In
Domain = DATA Supplicant = 6677.8899.AABB Port Status = AUTHORIZED Authentication Method = Dot1x
Catalyst 3750 SERIES
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 15X 17X 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 31X 33X 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 47X 1 3
B
BRKSEC-2005
SSC
SYST RPS MASTR STAT DUPLX SPEED STACK MODE
1X 2X 16X 18X 32X 34X 48X
Cisco Public
66
1X
interface GigE 1/0/5 switchport mode access switchport access vlan 2 switchport voice vlan 12 authentication host-mode multi-domain authentication port-control auto authentication timer inactivity 300 mab
Device Unplugs
Domain = DATA Supplicant = 0011.2233.4455 Port Status = AUTHORIZED Authentication Method = MAB
1X
Caveats: Quiet devices may have to reauth; network access denied until re-auth completes. Still a window of vulnerability.
= DATA = UNAUTHORIZED
1X
BRKSEC-2005
Cisco Public
67
1X
1X
2X
16X 18X
32X 34X
Nothing to configure
Device B Plugs In Domain = DATA Supplicant = 6677.8899.AABB Port Status = AUTHORIZED Authentication Method = Dot1x
SSC
Catalyst 3750 SERIES
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 15X 17X 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 31X 33X 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 47X 1 3
1X
BRKSEC-2005
Cisco Public
68
VM
No VLAN Assignment Supported Superset of MDA with multiple Data Devices per port
Cisco Public
BRKSEC-2005
71
73
Authorization
Authorization is the embodiment of the ability to enforce policies on identities Typically policies are applied using a group methodologyallows for easier manageability The goal is to take the notion of group management and policies into the network Types of Authorization:
Default: Closed until authenticated.
BRKSEC-2005
Cisco Public
74
BRKSEC-2005
Cisco Public
75
TO DO Before implementing access control: Confirm that all these should be on network Install supplicants on X, Y, Z clients Upgrade credentials on failed 802.1X clients Update MAC database with failed MABs
RADIUS accounting logs provide visibility: Passed/Failed 802.1X/EAP attempts List of valid 802.1X capable List of non-802.1X capable Passed/Failed MAB attempts List of Valid MACs List of Invalid or unknown MACs
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
76
interface GigabitE 3/13 authentication port-control auto authentication open ip access-group UNAUTH in
Pinhole explicit tcp/udp ports to allow desired access Block General Access Until Successful 802.1X, MAB or WebAuth
BRKSEC-2005
Cisco Public
77
DHCP DNS
10.100.10.116
PXE Server
10.100.10.117
EAP
DHCP ANY DNS ANY (After Authentication) (Before Authentication) Switch#show tcam interface g1/13 acl in ip permit permit ip tcp host any 10.100.60.200 any established any match-any permit udp tcp any any established eq bootps match-any permit udp any any hosteq 10.100.10.116 bootps eq domain permit udp any host 10.100.10.116 10.100.10.117 eq domain tftp deny permit ip udp any any any host 10.100.10.117 eq tftp deny ip any any
PXE
Slide Source: Ken Hook
interface range gigE 1/0/1 - 24 switchport access vlan 30 switchport voice vlan 31 ip access-group UNAUTH in authentication host-mode multi-domain authentication open authentication port-control auto mab
ip access-list extended UNAUTH permit tcp any any established permit udp any any eq bootps permit udp any host 10.100.10.116 eq domain permit udp any host 10.100.10.117 eq tftp
Sample Open Mode Configs
BRKSEC-2005
Cisco Public
78
Dynamic Authorization:
VLAN Assignment Dynamic VLAN assignment based on identity of group, or individual, at the time of authentication VLANs assigned by nameallows for more flexible VLAN management Tunnel attributes used to send back VLAN configuration information to authenticator Tunnel attributes are defined by RFC 2868 Usage for VLANs is specified in the 802.1X standard
BRKSEC-2005
Cisco Public
79
Marketing
VLAN name must match switch configuration Mismatch results in authentication failure
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
80
URL Redirect
Client Authentication Process RADIUS
1 2
802.1X/MAC Authentication RADIUS authorizes port with URL redirect User Initiates Web Connection
4
Switch Port Redirects to Web Page
Requires HTTP on the switch Mainly used for custom notification at this time Future integration with other Cisco products
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
Web Page
82
Authorization Recommendations
All Authorization (VLAN, dACL, etc.) is completely optional Only use it if you have to separate users due to a business requirement Most enterprises do not have this requirement for known users Leave the port in its default VLAN or assign the VLAN during machine authentication if possible
BRKSEC-2005
Cisco Public
83
84
BRKSEC-2005
Cisco Public
85
Supplicant Considerations
Microsoft Windows
User and machine authentication DHCP request time out Machine authentication restriction Default methods: MD5, PEAP, EAP-TLS
Unix/Linux considerations
Open source: xsupplicant Project (University of Utah)
86
Features
Robust Profile Management Support for industry standards Endpoint integrity Single sign-on capable Enabling of group policies
Administrative control
Benefits
Simple, secure device connectivity Minimizes chances of network compromise from infected devices Reduces complexity
SSC
BRKSEC-2005
Cisco Public
87
88
X X X X X X X
Obtain Network Address (Static, DHCP)
Earliest Network Connectivity with User Auth Only User GPOs Loading (Async) GPO based Logon Script Execution (SMB) GPO based Startup Script Execution Computer GPOs Loading (Async)
DHCPTimeout at 62 Seconds
DHCP
BRKSEC-2005
Cisco Public
90
91
Why do we care?
Pre-802.1X this worked under the assumption that network connectivity was a given; post-802.1X the blocking of network access prior to 802.1X authentication breaks DHCP & machine-based group policy model UNLESS the machine can authenticate using its own identity in 802.1X
BRKSEC-2005
Cisco Public
92
BRKSEC-2005
Cisco Public
95
Authentication Server
Login Req. Send Credentials Accept ICMP Echo (x3) for Default GW from Old IP as Soon as EAP-Success Frame Is Rcvd DHCP-Request (D=255.255.255.255) (After Pings Have Gone Unanswered) DHCP-Discover (D=255.255.255.255) Forward Credentials to ACS Server Auth Successful (EAPSuccess) VLAN Assignment
96
X X X X X X
Obtain Network Address (Static, DHCP) Determine Site and DC (DNS, LDAP) Establish Secure Channel to AD (LDAP, SMB)
Kerberos Auth (User Account) User GPOs Loading (Async) GPO based Logon Script Execution (SMB) GPO based Startup Script Execution Computer GPOs Loading (Async)
Machine VLAN
User VLAN Components that are in race condition with 802.1X Auth
97
VLAN1 10.1.1.1
VLAN2 99.1.1.1
Obtain Network Address (Static, DHCP) Determine Site and DC (DNS, LDAP) Establish Secure Channel to AD (LDAP, SMB)
Kerberos Auth (User Account) User GPOs Loading (Async) GPO based Logon Script Execution (SMB)
Start of 802.1X auth may vary among supplicants Components that are in race condition with 802.1X Auth
BRKSEC-2005
Cisco Public
98
BRKSEC-2005
Cisco Public
99
BRKSEC-2005
Cisco Public
100
VLAN assignment requires AD, DHCP server, and network switch changes (planning, routing, trunking, etc.)
Access Control Lists (ACLs) are a policy enforcement alternative to VLANs. Beware of TCAM implications: the number of ACEs on L3 switch is limited. ACL per port can be assigned by RADIUS server per group.
BRKSEC-2005
Cisco Public
101
102
Remote Desktop
XP: Microsoft Remote Desktop logs off the local user and drops the machine into machine mode which results in a machine auth.
Vista: Leaves the local user logged onto the system, so it does not trigger an 802.1X auth.
If machine authentication and user authentication result in the same VLAN then there are no problems If machine authentication puts the machine in a different VLAN, then user authentication must be maintained despite Windows logging the user off. SSC on XP provides the above solution
BRKSEC-2005
Cisco Public
103
PXE BIOS
105
PXE Solution 1
MAC Authentication Bypass (MAB) *
Client
Dot1x/MAB
RADIUS
Upon link up
X X
10-seconds
X X ?
X
10-seconds 10-seconds Variable Port Enabled RADIUS-Access Request: 00.0a.95.7f.de.06 RADIUS-Access Accept
DHCP Discover 4
PXE Continues
PXE BIOS
00.0a.95.7f.de.06
interface GigabitE 3/13 authentication port-control auto dot1x timeout tx-period 10 mab
106
PXE Solution 2:
Open Mode with Interface ACL
Selectively Open Access
interface GigabitE 3/13 authentication port-control auto authentication open ip access-group UNAUTH in
PXE BIOS
BRKSEC-2005
Cisco Public
107
802.1X controls port traffic in BOTH directions Use WOL support on switch to allow outbound (from switch) traffic to wake up device
BRKSEC-2005
Cisco Public
108
110
BRKSEC-2005
Cisco Public
111
RADIUS logs
NAD CLI SNMP on NAD
SNMP on NAP
NAD CLI
BRKSEC-2005
Cisco Public
112
RADIUS Process
Access-Accept
BRKSEC-2005
Cisco Public
113
RADIUS Process
3
4
Accounting-request packets Contains one or more AV pairs to report various events and related information to the RADIUS server
114
BRKSEC-2005
Cisco Public
115
Troubleshooting:
Identify Points of Failure
It is important to understand the failure point in the picture It is important to understand which issue causes what failures In most case, description of the issue symptom can be vague or misleading and you must correlate separate pieces of information for problem resolution.
BRKSEC-2005
Cisco Public
116
BRKSEC-2005
Cisco Public
117
BRKSEC-2005
Cisco Public
118
BRKSEC-2005
Cisco Public
119
ID-6500a#sho authentication session interface gigabitEthernet 7/1 Interface: GigabitEthernet7/1 MAC Address: 000f.2322.d9a2 IP Address: 10.6.110.2 User-Name: 00-0F-23-22-D9-A2 Status: Authz Success Domain: VOICE Oper host mode: multi-domain Oper control dir: both Posture Token: Unknown Authorized By: Authentication Server Session timeout: N/A Idle timeout: N/A Common Session ID: 0A00645A00000007000E37CC Acct Session ID: 0x00000009 Handle: 0x0E000007 Runnable methods list: Method State dot1x Failed over mab Authc Success ---------------------------------------Interface: GigabitEthernet7/1 MAC Address: IP Address: User-Name: Status: Domain: Oper host mode: Oper control dir: Posture Token: Authorized By: Vlan Policy: Session timeout: Idle timeout: Common Session ID: Acct Session ID: Handle: 000d.60fc.8bf5 10.6.50.2 nac\darrimil Authz Success DATA multi-domain both Healthy Authentication Server 50 N/A N/A 0A00645A0000000D0030B498 0x00000011 0x1500000D
Runnable methods list: Method State dot1x Authc Success mab Not run
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
120
EAP Problem
Certificate Trust Issues
One of the most common issues seen in deployment and pilots
ACS 4.2
ACS 5.0
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
121
Session Timeout (Radius Attribute 27) is not assigned to port Reauthentication timer value
Consequently there is no VLAN 0, therefore default port VLAN is used for authorization, and if there is no DHCP setup for this VLAN then client cant obtain IP address. Also Reauthentication Timer becomes 0. This means that there will be no reauthentication. Supplicant might try to re-DHCP if its cant get an IP address
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
122
Auth Feature vlan_assign events debugging is on *Dec 15 14:46:58.439: %AUTHMGR-5-START: Starting 'dot1x' for client (000d.60fc.8bf5) on Interface Gi7/1 *Dec 15 14:46:59.243: %DOT1X-5-SUCCESS: Authentication successful for client (000d.60fc.8bf5) on Interface Gi7/1 *Dec 15 14:46:59.243: %AUTHMGR-7-RESULT: Authentication result 'success' from 'dot1x' for client (000d.60fc.8bf5) on Interface Gi7/1 *Dec 15 14:46:59.243: AUTH-FEAT-VLAN-ASSIGN-EVENT (Gi7/1): Successfully assigned VLAN 0 *Dec 15 14:46:59.751: %AUTHMGR-5-SUCCESS: Authorization succeeded for client (000d.60fc.8bf5) on Interface Gi7/1
ID-6500a#sho authentication sess interface g 7/1 Interface: GigabitEthernet7/1 MAC Address: IP Address: User-Name: Status: Domain: Oper host mode: Oper control dir: Authorized By: Vlan Policy: Session timeout: Idle timeout: Common Session ID: Acct Session ID: Handle:
BRKSEC-2005
000d.60fc.8bf5 10.6.50.2 nac\darrimil Authz Success DATA multi-domain both Authentication Server N/A N/A N/A 0A00645A0000000E005DD8A8 0x00000013 0xF900000E
Cisco Public
123
124
Passed Authentication reports authentication is successful Authorization failure on switch is NEVER reported back to ACS.
*Aug 26 13:44:29.991: %DOT1X-5-SUCCESS: Authentication successful for client (000d.60fc.8bf5) on Interface Gi7/1 *Aug 26 13:44:29.991: %AUTHMGR-7-RESULT: Authentication result 'success' from 'dot1x' for client (000d.60fc.8bf5) on Interface Gi7/1 *Aug 26 13:44:29.991: %EPM-6-POLICY_REQ: IP=0.0.0.0| MAC=000d.60fc.8bf5| AUDITSESID=0A00645A000000140090E0A0| AUTHTYPE=DOT1X| EVENT=APPLY *Aug 26 13:44:29.991: %EPM-6-AAA: POLICY=xACSACLx-IP-phone-dACL-48a4f023 | EVENT=DOWNLOAD-REQUEST *Aug 26 13:44:30.003: %EPM-6-AAA: POLICY=xACSACLx-IP-phone-dACL-48a4f023 | EVENT=DOWNLOAD-SUCCESS *Aug 26 13:44:30.003: %EPM-4-POLICY_APP_FAILURE: IP=0.0.0.0| MAC=000d.60fc.8bf5| AUDITSESID=0A00645A000000140090E0A0| AUTHTYPE=DOT1X| POLICY_TYPE=Named ACL| POLICY_NAME=xACSACLx-IP-phone-dACL-48a4f023| RESULT=FAILURE| REASON=Interface ACL not configured *Aug 26 13:44:30.003: %EPM-6-IPEVENT: IP=0.0.0.0| MAC=000d.60fc.8bf5| AUDITSESID=0A00645A000000140090E0A0| AUTHTYPE=DOT1X| EVENT=IP-WAIT *Aug 26 13:44:30.031: %AUTHMGR-5-FAIL: Authorization failed for client (000d.60fc.8bf5) on Interface Gi7/1
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
125
Looking Forward
BRKSEC-2005
Cisco Public
126
Confidentiality & Integrity Centralized Role Based Access Control (RBAC) Policy Administration Identification, Authentication and Authorization for all networked entities, and classification into topology independent security groups
BRKSEC-2005
Cisco Public
127
User 1
7
User 2
Server 2
2 9 SGACL
RBACLs
Source Destination
4
User 3
S1+S2 S1 S2
Cisco ACS
7 9
1. Security Group Tag is applied on ingress switch port 2. Roles/Attribute-based ACL policies is applied on security group tags (permit, deny, log, police, remark, span, redirect, )
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
130
User 1
7
User 2
Server 2
2 9 SGACL
RBACLs
SGT
4
User 3
DGT
S1+S2 S1 S2
Cisco ACS
7 9
1. Security Group Tag is applied on ingress switch port 2. Roles/Attribute-based ACL policies is applied on security group tags (permit, deny, log, police, remark, span, redirect, )
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
131
User 1 has access to both servers User 2 has access to Server 1 User 3 access to Server 1 denied
User 1
1 SGACL
Server 1
7
User 2
Server 2
2 9 SGACL
RBACLs
SGT
4
User 3
DGT
S1+S2 S1 S2
Cisco ACS
7 9
1. Security Group Tag is applied on ingress switch port 2. Role-based ACL policies is applied on security group tags (permit, deny, log, police, remark, span, redirect, )
BRKSEC-2005 2009 Cisco Systems, Inc. All rights reserved. Cisco Public
132
BRKSEC-2005
Cisco Public
133
Primarily an MSFT desktop and server environment; small group of MAC OSX for designers
Approximately 14,000 ports at home office and remote stores Cisco IP Telephony environment Pervasive Wireless environment
BRKSEC-2005
Cisco Public
134
BRKSEC-2005
Cisco Public
135
No Wake On LAN Decided to handle credential re-provisioning via SSL VPN account triggered via help desk ticket Bought 3rd party tool to build MAC address database Extended SIM for reporting
Decided on access layer only deployment since data center had physical security
BRKSEC-2005
Cisco Public
136
BRKSEC-2005
Cisco Public
137
138
37.5%
37.5%
25%
MBDA
100% 100% 100% 100
MBDA DEUTSCHLAND
MBDA France
MBDA UK
MBDA ITALIA
Integrated organisation
BRKSEC-2005
Cisco Public
139
Summary
802.1X improves enterprise security 802.1X improves enterprise visibility 802.1X is a platform for other security initiatives Supplicants are important 802.1X is deployable now New features have significantly simplified deployment 802.1X is not only a network project, it affects the whole IT organization
BRKSEC-2005
Cisco Public
140
Q&A
BRKSEC-2005
Cisco Public
141
Dont forget to activate your Cisco Live Virtual account for access to all session material, communities, and on-demand and live activities throughout the year. Activate your account at the Cisco booth in the World of Solutions or visit www.ciscolive.com.
144
BRKSEC-2005
Cisco Public
BRKSEC-2005
Cisco Public
145