Network Access Control - 3 Popular Vendors
Network Access Control - 3 Popular Vendors
Abstract
Computers connected to the Internet are very much part of every day life. People now use their
computers in many different ways, such as online banking, online shopping, email, travel planning, news
gathering, etc. It has provided users convenience and the ability to search for things on a moment’s
notice. However, by being able to easily log in to and access almost any worldwide site on the Internet,
this has also exposed them to software called Malware, such as worms, viruses, Trojans, spy ware, data
leakage and identity theft. Additionally, it places their networks at risk to which these computers are
connected if they become infected. With an increased remote workforce, businesses also face these
issues when their workers attempt to connect to the corporate network through Virtual Private Networks
(VPN), or through a growing deployment of wireless technologies and mobile computing with devices,
such as smart phones and PDAs. All these factors make Network Access Control (NAC) an important
tool to have for today’s businesses.
NAC controls the connections coming from the outside and also provides protection from every
network connection coming from within the corporate firewall. It also provides security and controls for
those, who has access to the network and its resources.
This paper describes what NAC is, what prerequisites are required to implement it, and its
implementation process. It also introduces the larger network environment by discussing its main
players, such as: Cisco, Microsoft, Trusted Network Group, and Juniper, who are involved in
developing the technology and standards.
INTRODUCTION
The security started with antivirus software from Symantec, Trend Micro, and McAfee running on end
devices which uses client server communication to update the virus definition files. Antivirus software
was followed by software-based personal firewalls from Microsoft, Norton, Trend Micro, and
ZoneAlarm which provided some access control. The software then transformed into firewall devices,
IPSec VPN devices, and SSL VPN devices with an increasing need to access remote networks. This
software finally took the form of the technology called Network Access Control which added another
layer of protection against potential security threats. NAC, in its original form, was host posture check,
quarantine, and remediation which involved a user seeking access to a network. If the user hadn’t
received recent OS patches or antivirus with an up-to-date virus definition running on its system, then
the user would not be allowed in the network but instead would be placed on a VLAN or network
(quarantine) until it was compliant with requirements of the network (remediation).
As technology is developing, NAC is not only granting access to the network sought by employees,
guests, non employees, and protecting it against security threats but also controlling the access all over
the network based on the user’s role. The access to network is permitted, denied, or restricted based on
the user’s identity or membership to a particular group [4].
Copyright © 2007 by Arti Sood. Published by Rivier College, with permission. 1
ISSN 1559-9388 (online version), ISSN 1559-9396 (CD-ROM version).
Arti Sood
1 OVERVIEW
Network access control should perform five fundamental functions: pre-admission host posture
checking; quarantine and remediation; identity aware and policy based authentication, resource access
control, and post–admission check along with ongoing threat analysis and containment. No single
vendor has solution that addresses all five NAC areas but customers are attempting to solve only
portions of network access control problems. A few players in network access control technology are:
Microsoft with its Network Access Protection (NAP) technology works through Windows Operating
Systems; Cisco has Network Admission Control (NAC), which depends on Cisco’s switching
infrastructure; Trusted Network Group has standard based Trusted Network Connect (TNC); and Juniper
has Unified Access Control (UAC), which uses TNC open standard specification. It is clearly becoming
evident that network access control is moving towards framework architecture where various
components work together to implement network access control [5].
2
NETWORK ACCESS CONTROL
policy server validates the assessment data, consults the patch manager and the user directory, and
grants limited or full access to the client based on the data.
3
Arti Sood
4.2 802.1x
IEEE 802.1x standard manages port-based access. It authenticates devices attached to LAN ports by
initiating the connections and requesting login details. Access is prevented if the user fails
authentication. IEE 802.1x attaches EAP to both wired and wireless media and supports multiple
authentication methods, such as, tokens cards, one-time passwords, certificates, and public key
authentication. It was designed to accommodate and allow network control at port level, authentication,
authorization, accounting technology, public network security, and distribution of dynamic encryption
keys.
4
NETWORK ACCESS CONTROL
The key elements of the framework are supplicant, port, authenticator, Extensible Authentication
Protocol, EAP over LAN, and RADIUS (see Figure 2).
The supplicant is the client that grants the network access and use EAP over LAN (EAPoL)
messages for management functions, such as, start, log off, and key distribution. The port is where the
device is attached either directly into a 802.1x switch or wireless access point. The wireless access point
is called authenticator and it acts as a go between supplicant and authentication server. RADIUS server
manages the database of users, provides authentication by verifying username and password provides
authorization, such as, dynamic VLAN assignment, and provides accounting information about how
long a user was connected and how much data they transferred.
This is the most secure network access control technology.
4.3 DHCP
DHCP sever passes out leases and host configuration information. The access can be controlled by
controlling the issuing of the IP address.
4.4 VPN
VPN can be used to restrict access by rejecting non-VPN traffic, thus disallowing traffic from an
infected host or attacker. The VPN servers may also be able to handle encryption and decryption.
5
Arti Sood
5. NAC VENDORS
There are many vendors in the network access control arena but few are chief contenders because they
have too much at stake due to a large portfolio of products. This forms fabric of a network for Cisco,
Juniper, and Microsoft.
6
NETWORK ACCESS CONTROL
As per step one, the endpoint sends a packet through the router on to its destination. The packet
matches the Intercept ACL applied to the router's interface, which initiates the NAC-L3-IP posture-
validation process. The second step involves setting a tunnel between the agent on the endpoint and the
ACS server. The third step involves establishing a secure tunnel RADIUS tunnel between the router and
the ACS server. The fourth step involves PEAP or a Protected Extensible Authentication Protocol tunnel
between the endpoint and ACS server to exchange the posture credentials. The posture credentials may
be passed on to the Antivirus server, as per step five, for further validation using the Host Credentials
Authorization Protocol (HCAP). As per step six, the host is assigned a security posture by the ACS
server based on the results of the rules defined by administrator on the ACS server. As per step seven,
the user’s browser may be directed to a remediation server if the host is deemed unhealthy; otherwise, it
is permitted full access as per step eight.
As per step 1, endpoint is attached to a switch port. As soon as step 2, the link comes up and
802.1X supplicant sends an authentication request to the 802.1x switch. In step 3, the user credentials
are passed to the ACS server via RADIUS. Step 4 has the ACS server authenticating the user. In step 5,
there is a FAST tunnel established between the agent on the machine and the ACS server over the
sessions established by 802.1x switch and RADIUS. As per step 6, user credentials are requested by the
ACS server. Step 7 is optional where the ACS server proxies posture credentials for extra validation to
the AV server using HCAP. In step 8, as defined by the security policy on the ACS server to posture
credentials, the posture is applied to a host which is further applied to the port to which the machine is
connected. In step 9, the ACS server can send a message to the host to redirect it to the remediation
server. Finally, in step 10, the host is granted or denied access to the network based on its posture and
VLAN assignment [11].
7
Arti Sood
NAP was announced as a set of extensions for the Windows Server 2003 and Microsoft Windows XP
[12]. NAP is software only framework and Windows-specific that includes Active Directory, a server
called Network Policy Server (NPS), a NAP agent that will be shipped with Longhorn, Vista, and as an
upgrade to XP SP2. The framework also has SHAs (System Heath Agents) which includes desktop
firewalls, antivirus scanners, and patch management systems. The status reports referred to as
Statements of Health (SoH) are sent by SHA to another server called HRA (Health Registration
Authority). The IAS server will be also required if remote access is required. The NPS integrates with
external authorities like antivirus and patch management servers to retrieve the current configuration
information. The endpoints are issued Health Certificates by the HRA or directed for remediation if they
fail the health check. In the NAP framework, the client connects to the 802.1X switch to pass
authentication and present Health Certificates to NPS. Following the authentication, an appropriate
VLAN is provided for access, quarantine, or remediation. The other components of the NAP framework
include the 802.1x devices (Access points and switches), DHCP server, Remediation servers handling
the clients with limited access, and Active Directory maintaining the user information. See Figure 5 for
NAP framework components.
8
NETWORK ACCESS CONTROL
By adhering to the open standard by TNC, UAC allows organizations to leverage their existing
heterogeneous network by quickly and effectively applying network access control. It enables high
flexibility and return on investment for the organization (see Figure7). A TNC client on the agent side
9
Arti Sood
runs on the endpoint which communicates with the TNC sever running on the Infranet Controller
responsible for authentication. The TNC client provides the update to the server about the posture of the
client [17].
6. NAC STANDARDS
The proprietary solutions tie the user to one vendor, today‘s networks have networking equipment from
wide range of vendors, therefore only open, multi-vendor NAC standards can achieve inoperability and
meet challenges of borderless networks.
10
NETWORK ACCESS CONTROL
The network access layer has Network Access Requestor (NAR) on endpoints (network nodes)
which negotiate and establish network access along with implementing security, such as, 802.1x
supplicants, VPN clients, and web browsers initiating SSL, are all NARs for Access Requestor. The PEP
is the network infrastructure device, such as, switch, wireless AP, or a VPN concentrator which can
control the access. The PEP is controlled by PDP which determines whether the endpoint should be
admitted to network and the level of access to be granted. The PDP is Network access Authority (NAA)
which may be RADIUS server.
The integrity evaluation layer has a TNC client that collects integrity measurements from Integrity
Measurement Collectors (IMCs), which are plug-in modules. It reports the health of the endpoint and
delivers reports [Integrity Measurements (IMs)] to a TNC server in PDP component. The TNC server
delivers the IM to Integrity Measurement Verifiers (IMV), which checks the state of the endpoint
against the policy.
The integrity measurement layer has IMC(s) and IMV(s). Additionally, there are interfaces or plug-
in APIs, such as: IF-IMC between the TNC client and IMC, IF-IMV between TNC server and IMV, IF-
TNCCS between TNC client and server, and IF-T for Tunneled EAP Methods, such as, EAP-TTLS,
EAP-FAST, and EAP-PEAP allowing the TNC architecture to work with networking technologies that
support EAP authentication like 802.1x and IKEv2. Finally IF-PEP or RADIUS specifies the usage of
the RADIUS protocol between NAA (AAA/RADIUS server) and PEP.
CONCLUSION
Though this paper has concentrated on three popular vendors, the NAC market is exploding with various
product offerings from companies like Trend Micro, Symantec, Enterasys, and McAfee. Infonetics
Research estimates that worldwide annual sales of NAC enforcement systems will reach almost $3
billion by the start of 2009. There will be continuous debate in the future about using the network
integrated devices, network enforcement applications, or the SSL VPN for network access control. This
will become better defined as the market matures [16].
GLOSSARY
AAA Server: Authentication Authorization Accounting Server
API: Application Programming Interface
DHCP: Dynamic Host Configuration Protocol
EAP: Extensible Authentication Protocol
EAP-FAST: EAP Flexible Authentication via Secure Tunneling
EAP-PEAP: EAP Protected Extensible Authentication Protocol
EAP-TTLS: EAP Tunneled Transport Layer Security Protocol
IEEE: Institute of Electrical and Electronics Engineers
IETF: Internet Engineering Task Force
IKE: Internet Key Exchange Protocol
IPSec: Secure Internet Protocol
LDAP: Lightweight Directory Access protocol
OS: Operating system
SSL: Secure Socket Layer
VLAN: Virtual Local Area Network
VPN: Virtual Private Network
11
Arti Sood
REFERENCES
[1] Network Access Control: An Introduction. Retrieved from http://www.itsecurity.com/features/introduction-network-
access-control-120506/ on April 12, 2007.
[2] Network Access Control: Securing the Perimeter. Retrieved from
http://www.networksecurityjournal.com/features/network-access-control-securing-the-perimeter-031607/ on April 12,
2007.
[3] Network Access Control Decision Framework. Retrieved from www.cisco.com/global/ES/pdfs/2006_10_gartner-
NAC_decision_fr.pdf on April 22, 2007.
[4] Defending an Expansive Definition of NAC. Retrieved from
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci1226473,00.html on April 12, 2007.
[5] NAC and Endpoint Security Frameworks: Which Way to Go? Retrieved from
http://searchnetworking.techtarget.com/originalContent/0,289142,sid7_gci1228723,00.html on April 22, 2007.
[6] NAC Vendors vie Over Architecture, Product Direction. Retrieved from
http://www.networkcomputing.com/gswelcome/showArticle.jhtml?articleID=197000856 on April 22, 2007.
[7] Analysis: Network Access Control. Retrieved from
http://www.networkcomputing.com/channels/security/showArticle.jhtml?articleID=193101592 on April 12, 2007.
[8] NAC underneath the Covers: Endpoint Health Assessments. Retrieved from
http://searchnetworking.techtarget.com/general/0,295582,sid7_gci1228598,00.html on April 14, 2007.
[9] Cisco to Unleash Security Plan. Retrieved from http://www.infoworld.com/article/04/06/18/HNcisonet_1.html on April
23, 2007.
[10] NAC Enforcement Tools Fall Short. Retrieved from http://www.networkworld.com/reviews/2007/041907-nac-intro.html
on April 23, 2007.
[11] NAC Solution and Technology Overview Retrieved from http://www.informit.com/articles/article.asp?p=680828&rl=1
on April 24, 2007.
[12] Network Access Protection Platform Architecture, Microsoft Corporation. Retrieved from
http://www.microsoft.com/technet/network/nap/naparch.mspx on April 12, 2007.
[13] Trusted Net Specifications Gain Broad Support. Retrieved from
http://www.eetimes.com/showArticle.jhtml;jsessionid=M1YA00UUKGPT0QSNDLOSKHSCJUNN2JVN?articleID=18
7200845 on April 25, 2007.
[14] Remote User Dial-In User Service. Retrieved from http://www.faqs.org/rfcs/rfc2865.html on April 12, 2007.
[15] Build Borderless Networks You Trust. Retrieved from
http://www.networksystemsdesignline.com/showArticle.jhtml;jsessionid=5VJAEIBNIFAF0QSNDLRSKH0CJUNN2JV
N?articleID=187002030 on April 25, 2007.
[16] What You Should Know About Network Admission Control. Retrieved from
http://sslvpn.breakawaymg.com/eps/NAC.php on April 25, 2007.
[17] Juniper Unified Access Control 2.0. Retrieved from
http://www.juniper.net/products_and_services/unified_access_control/ on April 26, 2007.
_____________________________________
*
ARTI SOOD received her Bachelor’s degree in Science and Education from Punjab University, India. After obtaining
P.G. Diploma in Computer Science, she worked as database application developer. She moved to the U.S. in 1996 and
worked with Emerging Markets, Inc., and Gambit Communications, Inc. on web development and network simulation
tools till 2005. Arti works currently as Senior Quality Assurance Engineer at Juniper Networks, Inc. developing security
products and pursuing M.S. in Computer Science at Rivier College.
12