Packetfence Nac
Packetfence Nac
and PacketFence
Network Startup Resource Center
These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license
(http://creativecommons.org/licenses/by-nc/4.0/)
What is Network Access Control?
●
Requiring users to authenticate before being
allowed onto the network
●
Establishing a strong link between user identity
and network location (physical port, IP address)
●
Creates accountability for network users
●
Prevents access by unauthorized users
Wireless NAC
●
Captive portal (typical hotspot)
– Browser login required for each session
●
WPA Enterprise (WPA 802.1x)
– Now widely supported by clients
– Credentials stored in client device
– In simplest mode (PEAP), client sends a username
+ password, validated by RADIUS server
●
WPA Enterprise becoming the preferred option
Wired NAC
●
802.1x can be used on managed switches too
●
Needs special software ("supplicant") on the
client, and 802.1x to be configured on the client
– Client cannot download the software or instructions
if their network port is blocked!
●
A captive portal solution is more user-friendly
●
But you want to avoid funnelling all your
network traffic through an in-line box
PacketFence
User authentication
database
PacketFence
vlan 4
R servers
vlan 11 vlan 41
vlan 21 vlan 31
building 4
building 1
building 2 building 3
Inline enforcement (less preferred)
●
Don't span the inline VLAN!
●
Create a separate inline VLAN per building
●
Trunk them through to the PacketFence box
●
This means the core device is now switching
not routing
●
NOT IDEAL but may be the only option with
dumb edge switches
Inline enforcement
eth1
Consider how
PacketFence PF outside and
eth0.11 eth0.31 server subnet
eth0.21 eth0.41 are routed
S
vlan 4
R servers
vlan 11 vlan 41
vlan 21 vlan 31
building 4
building 1
building 2 building 3
Inline enforcement
●
PacketFence becomes a one-legged router
●
PacketFence is choke point and SPOF
●
PacketFence does not (yet) support IPv6 for
inline enforcement
●
Core network device may be switching on some
VLANs and routing on others
VLAN Enforcement (preferred)
●
Each building needs:
– its own data VLAN (standard campus design)
– its own registration and isolation VLANs
●
PacketFence sits on the server network and is
out-of-line
VLAN Enforcement
vlan 4 servers
vlan 12
R Packet
vlan 13
vlan 14
Fence
vlan 42
vlan 22 vlan 32 vlan 43
vlan 23 vlan 33 vlan 44
vlan 24 vlan 34
building 4
building 1
building 2 building 3
vlan 4 servers
R
2 3
vlan 12
vlan 13 Packet
vlan 14
Fence
vlan 42
vlan 22 vlan 32 vlan 43
vlan 23 vlan 33 vlan 44
vlan 24 vlan 34
building 4
building 1
building 2 building 3