L2 - Network Access and Cloud Computing
L2 - Network Access and Cloud Computing
1
Network Access Control
– Network access control (NAC) is an
umbrella term for managing access to a
network.
2
Elements of Network Access Control
System
– Access requestor (AR)
• is the node that is attempting to access the
network.
– Policy server
• the policy server determines what access should
be granted.
– Network access server (NAS)
• functions as an access control point for users in
remote locations connecting to an enterprise’s
internal network.
3
4
Network Access Enforcement Methods
– Enforcement methods are the actions that are applied to ARs
to regulate access to the enterprise network. They are:
– IEEE 802.1X
• use of the Extensible Authentication Protocol for the authentication
process.
• IEEE 802.1X is the most commonly implemented solution.
– VLANs
• VLAN is a logical subgroup within a LAN that is created via software
rather than manually moving cables.
– Firewall
– DHCP management
• NAC occurs at the IP layer based on subnet and IP assignment
• DHCP is subject to various forms of IP spoofing, providing limited
security
5
Extensible Authentication Protocol
(EAP)
– EAP is a framework for network access and
authentication protocols.
8
EAP Authentication Methods
– EAP-TLS (EAP Transport Layer Security)
• EAP-TLS defines how the TLS protocol can be
encapsulated in EAP messages.
• EAP-TTLS (EAP Tunneled TLS) a secure
connection (the “tunnel”) is established with secret
keys.
• EAP-GPSK (EAP Generalized Pre-Shared Key) is
an EAP method for mutual authentication and
session key derivation using a Pre-Shared Key
(PSK).
• EAP-IKEv2 is based on the Internet Key Exchange
protocol version 2 (IKEv2)
9
EAP Exchanges
– Whatever method is used for authentication,
the authentication information and
authentication protocol information are
carried (or exchanged) in EAP messages.
10
EAP Message Fields
– EAP messages may include the following
fields:
• Code: Identifies the Type of EAP message. The
codes are Request (1), Response (2), Success (3),
and Failure (4).
• Identifier: Used to match Responses with
Requests.
• Length: Indicates the length of the EAP message.
• Data: Contains information related to
authentication.
11
EAP Usage Components
– EAP peer
• Client computer that is attempting to access a network.
– EAP authenticator
• An access point or NAS that requires EAP
authentication.
– Authentication server
• A server computer that negotiates the use of a specific
EAP method with an EAP peer, validates the EAP peer’s
credentials, and authorizes access to the network.
• Typically, the authentication server is a Remote
Authentication Dial-In User Service (RADIUS) server.
12
13
14
IEEE 802.1X Port-Based Network
Access Control
– IEEE 802.1X was designed to provide access control
functions for LANs.
15
Controlled and Uncontrolled Ports
– An uncontrolled port allows the exchange of
protocol data between the supplicant and the
AS, regardless of the authentication state of
the supplicant.
18
EAPOL packets
19
EAPOL Packet Format
– Protocol version: version of EAPOL.
– Packet type: indicates start, EAP, key, logoff,
etc.
– Packet body length: If the packet includes a
body, this field indicates the body length.
– Packet body: The payload for this EAPOL
packet. An example is an EAP packet.
20