Network Access Control: What Is NAC?: Joel M Snyder Senior Partner Opus One
Network Access Control: What Is NAC?: Joel M Snyder Senior Partner Opus One
Next Year
Determine security policy by who is connection not where they are connection from Create remote access solutions that focus on the end-user, not the network
dns web
IPsec VPN Branches
Clearly, Perimeter-based Security Wont Work All the Time So what do we do?
Defense in Depth Authenticate and Authorize all Network Users Deploy VLANs for traffic separation and coarse-grained security Use stateful firewalls at the port level for fine-grained security Place encryption throughout the network Detect and remediate threats to network integrity Include end-point security in policy enforcement Re-Perimeterize Re-create microperimeters where you can Use NAC (network access control) on the LAN
Use touch-down points (like tunnel servers) to re-establish controls: NAC on the VPN
5
1: 2: 3: to
Who are you? What do I know about you? Does your end-point comply policy?
OK, wait a second. Isnt Access Control what a firewall does? You shall not pass!
Internet
Common Firewall Decision Elements Source IP and port Destination IP and port Position Between two networks
Common NAC Decision Elements Username, Group Access method, Destination End-point security status Position Between user and network
10
Corporate Net
11
12
Where is the user coming from ? 2. Use environmental information as part of policy decision making When is the access request occurring? What is the End Point Security posture of the end point?
13
Allow or deny access. Put the user on a VLAN. Send user to remediation. Apply ACLs or firewall rules.
14
4. Manage it all
Corporate Net
NAC Policy Server
16
These are the IETF terms for each piece. TCG/TNC, Microsoft, and Cisco all have their own similar ones
17
Posture Collector
Posture Validator
What is it? Network Enforcement Point Component within the network that enforces policy, typically an 802.1X-capable switch or WLAN, VPN gateway, or firewall.
18
Posture Collector
Posture Validator
What is it? Posture Collector Third-party software that runs on the client and collects information on security status and applications, such as 'is A/V enabled and up-to-date?' Client Broker "Middleware" that talks to the Posture Collectors, collecting their data, and passes it down to Network Access Requestor Network Access Requestor Connects the client to network, such as 802.1X supplicant. Authenticates the user, and acts as a conduit for Posture Collector data
TCG TNC Integrity Measurement Collector TNC Client Network Access Requestor
Microsoft NAP System Health Agent NAP Agent NAP Enforcement Client
Cisco NAC Posture Plug-in Apps Cisco Trust Agent Cisco Trust Agent 19
Posture Collector
Posture Validator
What is it? Posture Validator Receives status information from Posture Collectors then validates it against policy, returning a status to the Server Broker Server Broker "Middleware" acting as an interface between multiple Posture Validators and the Network Access Authority Network Access Authority Validates authentication and posture, then passing policy to the Network Enforcement Point.
TCG TNC Integrity Measurement Verifier TNC Server Network Access Authority
Microsoft NAP System Health Validator NAP Administration Server Network Policy Server
Cisco NAC Policy Vendor Server Access Control Server Access Control Server 20
http://www.networkworld.com/research/2006/040306-nac-overview.html
21
Corporate Net
User brings up link (or associates with AP) AP/Switch starts 802.1X (EAP) for authentication User authenticates to central policy server If authentication (and other stuff) is successful, policy server instructs edge device to grant appropriate access. User gets IP address.
22
Corporate Net
User gets on network; gets IP address User opens web browser and is trapped by portal User authenticates to central policy server If authentication (and other stuff) is successful, portal lets traffic through or reconfigures network to get out of the way
23
User connects and gets IP address Client magically authenticates to NAC device If authentication (and other stuff) is successful, user is allowed on network
24
25
Corporate Net
User associates with AP For some, this is the AP starts authentication main reason to want NAC! User authenticates If authentication (and other stuff) is successful, user is given appropriate network access
26
27
Key Concept: Access Is a Function of Authentication and Environment Who You Are
Where You Are Coming From How Well You Comply with Policy
28
+
+
29
30
VLAN Assignment
Go/No-Go Decision
31
Dont jump into a proprietary solution without considering the emerging standard architectures
32
Thanks!
Joel Snyder Senior Partner Opus One [email protected]