Rapport Pfe Nac
Rapport Pfe Nac
FACULTY OF SCIENCES
AMOKRANE Idir
BRAHIM Badreddine
We have suggested a PacketFence solution that offers a network approach for secure access.
The implemented solution effectively manages network access, assigns VLANs dynamically
and roles to access that comply with predefined rules, and permits both employees and visitors
to bring their own devices.
Key words : PacketFence, Network Access Control, Protection, Open-source, Bring your own
device.
II
الملخص
تتعرض الشركات لهجمات يومية يمكن أن تؤدي إلى عدد من الكوارث .يمكن للشركات حماية أنظمة تكنولوجيا المعلومات
الخاصة بها من خالل خطة أمنية قوية .على الرغم من أن مجال األمان واسع ،إال أننا مهتمون بشكل خاص باستخدام
استراتيجية الموقف للتحكم في الوصول إلى شبكة الكمبيوتر الخاصة بهم والتحكم في االمتثال للجهاز الذي يتصل بها .نحن
أمرا مه ًما للغاية ،مما يجعل
نعلم أنه في بعض المؤسسات ،يكون عدد المستخدمين الذين يطلبون الشبكة بشكل متكرر ً
الحاجة إلى حل أكثر إلحا ًحا.
اقترحنا حل PacketFenceالذي يوفر منه ًجا شبكيًا للوصول اآلمن .يدير الحل الذي تم تنفيذه الوصول إلى الشبكة بكفاءة ،
ويقوم بشكل ديناميكي بتعيين شبكات محلية ويعين أدوار الوصول وفقًا لقواعد محددة مسبقًا ويسمح للموظفين والزوار
بإحضار أجهزتهم الخاصة.
الكلمات الدالة ، PacketFence :التحكم في الوصول إلى الشبكة ،حماية ،المصدر المفتوح ،أحضر جهازك الخاص
III
Résumé
Les entreprises sont soumises à des attaques quotidiennes qui peuvent entraîner un certain
nombre de catastrophes. Les entreprises peuvent protéger leurs systèmes informatiques en
s'appuyant sur un plan de sécurité solide. Bien que le domaine de la sécurité soit vaste, nous
sommes particulièrement intéressés par l'utilisation de la stratégie de posture pour contrôler
l'accès à leur réseau informatique et le contrôle de conformité de la machine qui s'y connecte.
Nous savons que dans certaines institutions, le nombre d'utilisateurs qui sollicitent
fréquemment le réseau est très important, ce qui rend le besoin d'une solution encore plus
pressant.
Nous avons proposé une solution PacketFence qui offre une approche réseau pour un accès
sécurisé. La solution mise en œuvre gère efficacement l'accès au réseau, attribue des VLANs
de manière dynamique et des rôles d'accès conformes à des règles prédéfinies et permet aux
employés et aux visiteurs d'apporter leurs propres appareils.
Mots clés : PacketFence, Contrôle d'accès au réseau, Protection, Open-source, Apportez votre propre
appareil.
IV
Acknowledgements
First of all, we would like to thank Allah the Almighty and merciful who gave us
the strength and the patience to accomplish this modest work.
Secondly, we would like to warmly thank our parents and siblings for the support
they gave us, our project supervisor Mr. Neffah Mohamed, for the opportunity he
gave us to work in a good environment and our promoter Pr. Ould-Khaoua
Mohamed for the trust placed in us and for accepting to direct this work. Our
sincere thanks to the members of the jury for the interest in our work by carefully
examining it. We would like to express our sincere thanks to all the teachers who
have taught us and who by their skills have supported us to succeed in our studies.
Finally, we would also like to thank all the people who have participated directly
or indirectly in the realization of this work.
V
Content
General Introduction ............................................................................................................................ 1
Organization of the report ................................................................................................................... 2
CHAPTER I: Background ............................................................................................................... 3
1. Introduction ................................................................................................................................. 3
2. Computer security ....................................................................................................................... 3
2.1. Computer security fundamentals......................................................................................... 3
2.2. Physical Security ................................................................................................................. 3
2.3. Logical Security .................................................................................................................. 4
2.4. Access Controls................................................................................................................... 4
2.4.1. Network Access Control (NAC) ................................................................................. 4
2.4.2. Types of Network Access Control............................................................................... 5
2.4.3. Network Access Control Concepts.............................................................................. 5
2.5. Network Access Control Protocols ..................................................................................... 7
2.5.1. IEEE 802.1X Protocol................................................................................................. 7
2.5.2. Radius Protocol ........................................................................................................... 7
2.5.3. EAP Protocol............................................................................................................... 9
2.6. General Architecture of NAC ............................................................................................. 9
3. Overview of Network Access Control (NAC) solutions........................................................... 10
3.1. Commercial access control solutions ................................................................................ 10
3.1.1. Cisco Identity Services Engine (ISE) ........................................................................ 10
3.1.2. FortiNAC .................................................................................................................. 11
3.1.3. Juniper Unified Access Control (UAC) .................................................................... 11
3.2. Open Source Access Control solutions ............................................................................. 11
3.2.1. PacketFence .............................................................................................................. 11
3.2.2. OpenNAC ................................................................................................................. 12
3.2.3. FreeNAC ................................................................................................................... 12
4. Choosing a network access control solution ............................................................................. 12
4.1. Comparative study of commercial and Open Source NAC solutions ............................... 12
4.2. The chosen Access Control solution ................................................................................. 13
5. Network Access Control tools .................................................................................................. 14
5.1. Some of PacketFence components .................................................................................... 14
5.1.1. FreeRADIUS protocol .............................................................................................. 15
5.1.2. Snort Intrusion Prevention System ........................................................................... 15
5.1.3. Nessus ....................................................................................................................... 15
VI
5.1.4. OpenVAS (Open Vulnerability Assessment System) ................................................ 16
6. Conclusion ................................................................................................................................ 17
CHAPTER II: Design and Implementation of the NAC Solution ................................................ 18
1. Introduction ............................................................................................................................... 18
2. Specification of requirements ................................................................................................... 18
2.1. Functional requirements.................................................................................................... 18
2.2. Non-functional requirements ............................................................................................ 18
3. Deployment steps ...................................................................................................................... 19
4. Topology model ........................................................................................................................ 19
4.1. Information about our network ......................................................................................... 20
5. Implementation of the solution ................................................................................................. 21
5.1. Infrastructure configuration .............................................................................................. 21
5.1.1. Initial switch settings ................................................................................................ 21
5.1.2. Interfaces and VLANs configuration ........................................................................ 21
5.1.3. DHCP and SSH configuration .................................................................................. 21
5.2. PacketFence configuration on the switch .......................................................................... 24
5.2.1. RADIUS server configuration .................................................................................. 24
5.2.2. Activation of AAA and dot1x functions.................................................................... 24
5.2.3. SNMP configuration ................................................................................................. 25
5.2.4. ACL configuration .................................................................................................... 25
5.2.5. Configuring the switch ports for 802.1X, MAB and VoIP ........................................ 26
5.3. Installation and integration of PacketFence and Active Directory ................................... 26
5.3.1. PacketFence Initial Setup .......................................................................................... 27
5.3.2. Installation of the domain controller (Active Directory) .......................................... 29
5.3.3. PacketFence and AD integration ............................................................................... 30
5.3.4. Configuring network devices .................................................................................... 31
5.4. Authentication source definition and policies ................................................................... 33
5.5. Connection profiles definition for 802.1X and MAC authentication................................ 37
6. Developing the Python Application for the Tests ..................................................................... 38
7. Conclusion ................................................................................................................................ 39
CHAPTER III: Testing phase ........................................................................................................... 40
1. Introduction ............................................................................................................................... 40
2. Flow chart for the operations of PacketFence ........................................................................... 40
3. Domain user testing .................................................................................................................. 40
4. Testing with “Your Network Friend” Application.................................................................... 45
4.1. Pinging from different VLANs ......................................................................................... 45
VII
4.2. Scanning the open and closed ports on a specific IP address............................................ 46
4.3. Sniffing the network to find some information ................................................................. 46
4.4. Pushing a configuration into the switch ............................................................................ 47
4.5. DNS lookup and reverse DNS lookup .............................................................................. 47
5. Conclusion ................................................................................................................................ 48
Conclusion and Future Works ........................................................................................................... 49
References……… ................................................................................................................................ 50
Appendix 1: Host Organization ................................................................................................... 52
1. Presentation of the host organization ........................................................................................ 52
1.1. Sonatrach........................................................................................................................... 52
1.2. Legal status ....................................................................................................................... 52
1.3. Subsidiaries ....................................................................................................................... 52
1.4. Missions and objectives .................................................................................................... 52
1.4.1. Missions .................................................................................................................... 52
1.4.2. Objectives ................................................................................................................. 53
1.5. Presentation of the organizational chart of the reception structure ................................... 53
1.6. Department of Reception Presentation (DC-DSI):............................................................ 54
VIII
List of abbreviations
Abbreviation Definition
AAA Authentication, authorization, accounting
ACL Access control list
AD Active directory
AR Access requester
AV Anti-virus
BYOD Bring your own device
CN Common name
CSV Comma separated values
CVE Common vulnerabilities and exposures
DB Data base
DC Domain component
DN Distinguished name
EAP Extensible authentication protocol
IDS Intrusion detection system
IPS Intrusion prevention system
ISE Identity services engine
LDAP Lightweight directory access protocol
MAB MAC authentication bypass
NAC Network access control
NAS Network access server
OU Organizational unit
OVF Open virtualization format
PAE Port access entity
PDP Policy decision point
PEP Policy enforcement point
PF PacketFence
RADIUS Remote authentication dial-in user service
SNMP Simple network management protocol
SSH Secure socket shell
UAC Unified access control
VDI Virtual desktop infrastructure
IX
List of figures
Figure I-1: Inline NAC Solution ............................................................................................................ 6
Figure I-2: Out-of-Band NAC Solution................................................................................................. 6
Figure I-3: Diagram showing how 802.1X authentication works [13] .................................................. 7
Figure I-4: Diagram of the RADIUS protocol operations flow [15] ..................................................... 8
Figure I-5: General Architecture of NAC [19] .................................................................................... 10
Figure I-6: PacketFence Components Architecture [24] ..................................................................... 15
Figure II-1: Deployment flowchart ..................................................................................................... 19
Figure II-2: Implementation network architecture............................................................................... 20
Figure II-3: Renaming the Switch ....................................................................................................... 21
Figure II-4: Configuring the VLANs .................................................................................................. 21
Figure II-5: Assigning IP addresses to the VLANs ............................................................................. 22
Figure II-6: Testing ping ..................................................................................................................... 22
Figure II-7: Configuring SSH.............................................................................................................. 23
Figure II-8: Configuring SSH user ...................................................................................................... 23
Figure II-9: Testing SSH through PuTTy ............................................................................................ 23
Figure II-10: Enabling radius server at the switch level ...................................................................... 24
Figure II-11: Enabling AAA and 802.1X at the switch level .............................................................. 25
Figure II-12: Configuring SNMP ........................................................................................................ 25
Figure II-13: Configuring the ACL ..................................................................................................... 26
Figure II-14: Configuring MAC Authentication, 802.1X and Voice Port .......................................... 26
Figure II-15: Choosing the enforcement mechanism .......................................................................... 27
Figure II-16: Configuring Ethernet interfaces ..................................................................................... 28
Figure II-17: Configuring the Database and administrator of the database......................................... 28
Figure II-18: Creation of an Organizational unit “Groups” ................................................................ 29
Figure II-19: Joining PacketFence to AD domain ............................................................................... 30
Figure II-20: Result of Joining PacketFence to Active Directory ....................................................... 30
Figure II-21: Adding created domain to Realms ................................................................................. 31
Figure II-22: Adding Huawei S5735 switch to network devices ........................................................ 31
Figure II-23: Switch Definition ........................................................................................................... 32
Figure II-24: Vlans necessary for the operation .................................................................................. 32
Figure II-25: Radius passphrase configuration.................................................................................... 33
Figure II-26: SNMP communication configuration ............................................................................ 33
Figure II-27: The new internal authentication source ......................................................................... 34
Figure II-28: Employees authentication rule ....................................................................................... 35
Figure II-29: Interns authentication rule.............................................................................................. 35
Figure II-30: Guests authentication rule .............................................................................................. 36
Figure II-31: Authentication against AD ............................................................................................. 36
Figure II-32: 802.1X connection profile ............................................................................................. 37
Figure II-33: Your Network Friend Application GUI ......................................................................... 38
Figure III-1: Organizational chart of the functioning of PacketFence ................................................ 40
Figure III-2: Enabling wired autoConfig service ................................................................................ 41
Figure III-3: Enabling 802.1X on Ethernet card ................................................................................. 41
Figure III-4: EAP settings ................................................................................................................... 42
Figure III-5: Authentication window .................................................................................................. 42
Figure III-6: Authentication on the PacketFence side ......................................................................... 43
X
Figure III-7: Authentication radius reply ............................................................................................ 43
Figure III-8: Registered nodes............................................................................................................. 44
Figure III-9: Node location in local network....................................................................................... 44
Figure III-10: Radial model for detected nodes .................................................................................. 45
Figure III-11: Pinging operations in different cases............................................................................ 45
Figure III-12: Scanning for open ports................................................................................................ 46
Figure III-13: Sniffing network traffic ................................................................................................ 46
Figure III-14: Pushing PacketFence configuration ............................................................................. 47
Figure III-15: DNS and reverse DNS lookup...................................................................................... 47
Figure 1-1: Sonatrach flowchart diagram ............................................................................................ 53
List of tables
Table I-1: Comparison between commercial and open-source NAC solutions ................................... 13
Table II-1: AD server configuration .................................................................................................... 29
XI
General Introduction
Recent years have seen a rise in the importance of laptops in people's daily lives. Customers
are incorporating the use of applications into their everyday routines as a result of the quick
development in device sales. These robust gadgets feature user-friendly interfaces, are pre-
loaded, and have access to millions of apps, not just for leisure but also for work [1].
Thanks to improved connection, applications are being developed to handle tasks that were
previously only possible in the office while traveling or at home. Due to the need for security
departments to modify their security systems to accommodate mobile devices, this phenomena
has led to changes in the organizational structure of businesses. To incorporate these tools into
their daily work processes, people are bringing them to work [1].
Businesses must adapt their access control, authentication, availability, and identity
management systems because Bring Your Own Device (BYOD) may have a significant
impact on how they manage their networks, laptops, and even their staff.
This report is about a solution for a problem that the Sonatrach Headquarters building is facing
in the idea that everyone should be able to bring their personal devices and use them in the
office for more productivity [2]. But we know that this idea can cause major security problems
on a network.
The goal of this work is to investigate the significance of network access control, which can be
found as a result of businesses having networks that are increasingly distributed, with offices
and business centers dispersed across various geographic locations (branches), all of which
require network access. The requirement to access data from any device and location without
compromising the security and confidentiality of the information, along with the complex
interconnectivity environment, increased the importance of the data held by businesses and
organizations. Companies need innovative solutions to address the additional risks and hazards
that these situations entail. Initiatives and technologies that fall under the umbrella of network
access control are developed to address this demand. Due to the frequent neglect of security-
related factors, end users typically do not consider security when using a communications
system or network. Users may occasionally view security negatively because they perceive it
to be inconvenient and interfere with their ability to do a specific task.
However, security is essential when dealing with computer-based tasks since it is the only
measure that can ensure that they are completed with a number of guarantees that are assumed
in the physical world. In order to specify how to secure network nodes before they access the
network, a concept known as "Network Access Control" and a set of protocols are established.
Before giving access to the network, NAC provides control mechanisms that enable validation
of previously set rules or policies. Allows the back office and the end user's computer
equipment to work together with the network infrastructure, such as routers, switches, and
firewalls, to guarantee that the information system is working properly before granting access
to the network. As the name suggests, network access control regulates access to the network
1
through pre- and post-admission regulations. Free software can be set up to establish this kind
of policy and can be used to provide Access Control.
Study and deployment of the PacketFence open-source NAC solution in an isolated network
especially made for this project powered by the Digital Innovation Center in Sonatrach’s
Headquarters.
● Make a needs analysis to identify functional and non-functional needs and determine
the security policies to be applied to secure the network environment to meet these
needs.
● Chapter II: is dedicated to the design and deployment of our open-source Access
Control solution.
● Chapter III: reserved for the functional tests of the solution carried out during this
end-of-study project.
● Conclusion and Future Works: general summary about the project and the future
works.
2
CHAPTER I: Background
1. Introduction
In this chapter, there will be initiation to the fundamental notions of computer security and
Access Controls, the presentation of some NAC solutions available on the market and then
choosing the appropriate one.
2. Computer security
There are several needs and requirements in the domain of computers and information systems
based on applications. The researcher must look into earlier thoughts or references in his
particular circumstance because all study has a goal known as a solution. Considering all
factors related to network security, including authentication, authorization, accessibility,
confidentiality, integrity, and the security of tools, services, and data [3].
● Availability: It is in charge of making sure that its goals are achieved since a system
needs to be built to be sufficiently resistant to intrusions and interference to ensure that
it operates correctly and is always accessible to users who want to use its services.
● Integrity: It is responsible for ensuring that a message or file hasn't been altered since
it was created or while it's being transmitted over a computer network.
3
2.3. Logical Security
Logical Access Controls are tools for identifying users with access to system resources as well
as the kinds of transactions and operations they are allowed to perform. To define the privileges
of authorized people, including the permissions, the kinds of transactions and functions that
are allowed, we use Access Control Lists (ACLs) and access rules (e.g., read, write, execute,
delete, create, and search). ACLs are frequently used to setup hardware and software, or they
may be delivered to routers and other devices after being administered offline. Setting up access
rules is needed to give authorized workers the right access privileges based on their positions
or duties [4].
Network Access Control (NAC) aims to incorporate endpoint security technologies. It includes
network security enforcement, user or system authentication, host intrusion prevention, and
vulnerability assessment. The end-stations of employees and visitors that do not have anti-virus
software installed, patches, or host intrusion prevention systems are one of the most serious
risks to companies' networks [7].
○ NAC solutions have the ability to prevent clients from connecting to the network if
their antivirus software is absent or they need to upgrade their operating system, which
lowers the chance of malware spreading to other connected units.
4
○ The administrator can create policies using a NAC solutions, and it will assign these
policies to the desired switch or router.
● NAC based on Software Agents: The following stage involves installing small
programs called "Agents" on all of the systems that the NAC needs to govern. These
agents are resident on computers and other electronic devices. The findings of the
device's scans and monitoring are often sent to a centralized server via these agents. In
order to comply with security regulations, systems that do not fulfill the standards will
not be granted network access authorization, and they frequently receive some sort of
remedial step [9].
● NAC without Software Agents: Another variation is agentless NAC, which uses on-
demand software components. In this configuration, it is intended that a temporary
agent, typically an ActiveX control, regularly scans the client for security flaws or
violations of the security policy. The scan results are transmitted to the main policy
server, where if the system doesn't comply with the standards, an action is taken as
needed. The agent is downloaded once the procedure is finished [9].
● Dynamic NAC: It also goes by the name of "NAS Peer-to-Peer" because it is a choice
that doesn't require any network-level modifications or software installations on every
computer. Agents are installed in secure systems and occasionally become required [9].
● Agent versus Agentless: The authentication and security evaluation processes in NAC
technology can be performed directly by a software agent installed on the endpoint
device or indirectly by evaluating the answers of the endpoint device by an external
network-based scanning engine [11].
5
● Out-of-Band versus Inline: The placement of the decision-making and enforcement
mechanisms inside the network can also affect how NAC is set up. In the case of out-of-
band solutions (Figure I-2), a policy server that is not directly involved in network traffic
is often used. As an alternative, Inline NAC (Figure I-1) systems integrate enforcement
and decision-making at a single location that is part of the regular traffic flow [12].
The idea behind the deployment of NAC solutions by network operators is that some genuine
customers will experience network access denial (if users never had out-of-date patch levels,
NAC would be unnecessary). As a result, NAC solutions call for a way to fix the end-user
issues that prevent access [6].
6
○ Quarantine: A restricted IP network known as a quarantine network gives users routed
access to just specific hosts and Apps. When a NAC product finds that an end-user is
out-of-date, the switch port is assigned to a VLAN that is only routed to patch and update
servers and not to the rest of the network [6].
○ Captive Portals: A captive portal blocks HTTP traffic to websites and directs visitors to
a website application that offers guidance and tools for updating their PC. No network
usage other than the captive gateway is allowed until their computer clears an automatic
examination. Paid wireless access operates in a manner akin to this at public access points
[6].
● The Port Access Entity (PAE): Is the access point to the network.
7
and authorization of remote access. It is essentially based on a server (RADIUS), connected to
an identification database (LDAP for example) and a RADIUS client, called NAS (Network
Access Server), acting as an intermediary between the end user and the server. Exchanges
between the RADIUS client and the RADIUS server are encrypted and authenticated with the
support of a shared secret [14].
● Access-Reject : sent by the server when the connection needs to be closed or when the
authentication process fails.
● Access-Challenge : sent by the server to ask for more details, and therefore, a new
Access-Request packet.
The figure below (Figure I-4) shows the radius protocol operations flow:
1. The remote user provides the RADIUS client with the login, password, and MAC address
necessary for authentication.
2. The "Access-Request" packet is sent by the RADIUS client to the RADIUS server. All user
data, including client ID, password, and port number, is contained there. The MD5 hash
function will be used to hash the password if one is present.
8
3. The RADIUS server receives the request, validates the secret it shares with the RADIUS
client to ensure the packet's integrity, and then confirms the user's identity by extracting and
comparing the data from an AD directory. The RADIUS server has two options: it can either
request a new access request or more details.
4. following the challenge, the RADIUS client generates an Access-Request containing the
authentication information requested.
5. The request is then verified or denied by the RADIUS server, which then sends a "Access-
Accept" or "Access-Reject" packet. A list of authorized services, such as VLAN, may be
included in this packet.
● EAP Success: Packet sent to the client at the end of authentication if it is successful.
● EAP Failure: Packet sent to the client at the end of authentication if it is failed.
9
Figure I-5: General Architecture of NAC [19]
A high-level NAC architecture is depicted in the previous figure (Figure I-5), in which end
users can access corporate resources through WLAN, VPN, and LAN[19]. Depending on the
vendor's implementation, specific PDP and PEP operations may be located on a single server
or dispersed across several servers, but in general, the AR requests access, the PDP assigns a
policy, and the PEP upholds the policy.
The AR, which can be any managed device by the NAC system, such as workstations, servers,
printers, cameras, and other IP-enabled devices, is the node that is making the attempt to access
the network. A different system may examine the host instead of the AR performing its own
host assessment. The PDP receives the AR's evaluation in any situation.
The PDP is the mastermind behind everything. The PDP decides what access should be
provided based on the AR's posture and a company's specified policy. The NAC product
management system may frequently serve as the PDP. In order to assess the state of the host,
the PDP frequently uses back-end systems like antivirus, patch management, or a user
directory. For instance, an AV manager would inform the PDP if the host's AV software and
signature versions were up to date [18].
10
integration with third-party security solutions. It is an important tool for organizations to
improve their network security posture and protect against advanced threats [20].
• Integrated AAA services that support a variety of identity services, including Active
Directory, LDAP, RADIUS, RSA, OTP, and others.
• Integrated BYOD, mobility, and lifecycle management guests with centralized policy
management and feature-based access control
3.1.2. FortiNAC
Fortinet's Network Access Control solution, FortiNACTM, adds visibility, control, and
automated reaction for everything that connects to the network to the Security Fabric. In
addition to extending management to outside devices and orchestrating automatic responses to
a variety of networking events, FortiNAC offers defense against IoT threats [21].
UAC provides dynamic policy management and integration with multiple authentication
methods, such as Active Directory, LDAP, and RADIUS. It also includes advanced threat
detection and mitigation capabilities, such as policy-based quarantine and network access
control for IoT devices.
11
• Integration with the Snort IDS.
• Integration with the Nessus vulnerability scanner.
3.2.2. OpenNAC
Secure LAN/WAN access is provided by OpenNAC, an open-source Network Access Control.
It enables the use of adaptable access policies that are based on rules. It supports a variety of
network hardware from Extreme Networks, Cisco, Alcatel, and 3Com as well as clients running
Windows, Mac, Linux, and other operating systems.
It is built upon tested open-source building blocks like FreeRadius, iTop, Icinga, and our own
creation. It is very flexible and extensible, making it simple to incorporate new features. It is
adaptable enough to be integrated with existing systems for asset management, network
intrusion detection, and authentication. OpenNAC offers value-added services like network
configuration and discovery, backup of network device configurations, and network
monitoring in addition to its core Network Access Control functionality [23].
3.2.3. FreeNAC
FreeNAC is a dynamic VLAN management and LAN access control GPL open-source
solution. FreeNAC offers simple Virtual LAN assignment, LAN access control (for all types
of network devices like servers, workstations, printers, IP-phones, webcams, etc.), real-time
inventory of network endpoints, VLAN management, and patch cable documentation. In
"VMPS mode," end devices are identified either by MAC addresses or by Certificate & MAC-
Address (in "802.1X mode"). FreeRadius is included for 802.1X and OpenVMPS is included
for VMPS modes on the communications layer [25].
12
Table I-1: Comparison between commercial and open-source NAC solutions
Virtual machine ✓ ✓ ✓ ✓
support
Community Support ✓ ✓ ✓ ✓ ✓
Bandwidth ✓ ✓ ✓
Management
Network vendor ✓ ✓ ✓ ✓ ✓
support
NAC Agent ✓ ✓ ✓ ✓
Device Discovery ✓ ✓ ✓ ✓ ✓ ✓
Integration with ✓ ✓ ✓ ✓ ✓
Active Directory
Reporting Function ✓ ✓ ✓ ✓ ✓ ✓
● Only Cisco equipment is supported while an open architecture is required in our case
for its support for multi-vendor environments.
We note following an in-depth study of free and professional Access Control solutions, several
advantages, namely the availability of the source code and the possibility of studying it and
modifying it according to our needs and thus distributing it free of charge. In addition, there
are several users and developers who offer assistance by sharing documentations and
participating in forums, subsequently participating in the improvement of open-source
software.
13
After opting for an open-source solution, the main differences between open-source solutions
come from all the supported hardware, the basic functionalities, the possible actions, the
documentation, the community specific to each solution, as well as the ergonomics of the Web
interface, the granularity of the information obtained, and general security.
The free and open-source Network Access Control (NAC) solution called PacketFence is
objectively the best of the commercial and free solutions. It is supported by a company in the
event of requests for the development of specific and commercial functionalities. Also,
virtualization offers PacketFence deployments by small businesses resource optimization,
scalability, cost savings, simplified management, testing capabilities, and increased
availability. .In addition, each feature developed for enterprises is in turn subject to the open-
source version. The capacities are modular and can be combined. It is capable or comes with a
captive portal for registration and remediation, centralized wired and wireless management,
powerful BYOD management options, 802.1X support, bandwidth management, layer 2
isolation of problematic devices, integration with Snort/Suricata (IDS/IPS), Nessus/OpenVAS
vulnerability scanners, integration with Active Directory, and NAP (Network Access
Protection) clients for Health Check (SoH).
Any network, no matter how big or little, may be securely protected using PacketFence. Here
are the most suitable network types that PacketFence could run in banks, colleges and
universities, engineering companies, convention and exhibition centers, hospitals and medical
centers, hotels, manufacturing, school boards, telecommunications companies.
the figure below presents a summary of PacketFence main components and features :
14
Figure I-6: PacketFence Components Architecture [24]
5.1.3. Nessus
In terms of vulnerability scanning, Nessus is the market leader. It has the ability to spot
vulnerabilities, minimize risk, and guarantee that virtual, mobile, and cloud environments are
functioning properly.
It offers malware detection, vulnerability analysis, update management, and sensitive data
exploration. It is available in two versions: one for individuals costs $1500 annually, and the
other costs $5,000 annually for businesses [28].
● Scanning without requiring the installation of an agent on the target device; grouping
vulnerabilities according to CVE (Critical, High, Medium, Low, Info).
15
● Sending results by email.
16
6. Conclusion
In this chapter, we explored Network Access Control (NAC) strategies in the context of
computer security. We studied the basic notions of computer security and Access Control, such
as Network Access Controls and physical and logical security measures, were first defined. We
looked into the concepts, protocols, and overall architecture of NAC, among other things.
Following that, we reviewed both commercials and open-source NAC solutions, highlighting
some notable examples within each. We talked about both commercial and free solutions,
which are FortiNAC, Juniper Unified Access Control (UAC), Cisco Identity Services Engine
(ISE), PacketFence, FreeNac and OpenNAC.
We carried out a comparison study between open-source and commercial NAC solutions,
revealing details about their features, to assist in decision-making. After eliminating some
options, we ended up deciding on the Access Control system that best met our needs.
The FreeRADIUS protocol, the Snort intrusion prevention system, Nessus, and OpenVAS
(Open Vulnerability Assessment System) were also examined as important Network Access
Control tools, as were other PacketFence components.
We have acquired a thorough understanding of the subject by carefully examining the most
important components of computer security, NAC solutions, and some pertinent tools. When
deciding how to implement secure Access Controls in our network infrastructure, we can use
this knowledge to make well-informed choices.
The implementation process will be covered in more detail in the following chapter, along with
instructions on how to successfully deploy and set up the NAC solution we have selected.
17
CHAPTER II: Design and Implementation of the
NAC Solution
1. Introduction
After completing the theoretical concepts, we move on to the implementation of our solution,
which represents our main task. In this chapter, we will start by specifying the needs and focus
on the practical part. The realization of a solution that ensures Access Control of hosts
connected to the network.
2. Specification of requirements
This phase represents the "functional" and "non-functional" aspects of the solution.
■ Supervision :
● Checking blocked machines and view the various access phases for any given
machine.
■ Administration :
18
3. Deployment steps
Here (Figure II-1) are the major steps of our solution's deployment and we'll go over each
stage individually.
4. Topology model
Our solution is to implement PacketFence on our new server that uses ProxMox as a Virtual
Machines Manager which will be related to a Huawei S5735 switch and will control every new
attempt to access the network through Ethernet knowing that Sonatrach already has Wireless
Network Access Control through a portal. Our managing computer will be connected to the
PacketFence Virtual Machine and many other machines through the switch so that we can be
able to impose the NAC security solution to every one of them.
19
Figure II-2: Implementation network architecture
First of all, in order to implement our solution, we need to create our test environment (Figure
II-2). We will have to bring:
20
5. Implementation of the solution
5.1. Infrastructure configuration
5.1.1. Initial switch settings
First of all, we will have to configure our switch so that it can manage our network easily. The
first thing we did is to be connected to it through its console port and use the PuTTy terminal
emulation software to log in. The first thing that is asked is to enter the default username and
password for the switch, we enter admin as a username and [email protected] as a password.
Then, we are asked to set our own username and password. So, we did, then confirmed by
clicking on “y”. That’s it, now we will be able to access the switch with our new username and
password. Just after doing that, we will be able to give a new name to our switch. We used the
following commands (Figure II-3) :
First of all, let’s create our main VLANs. We will need to create two of them, number 10 for
the management that will be assigned as a default one for the trunk port and number 20 for the
data that will be assigned to the GE0/0/5 interface, as the following figure shows it (Figure II-
4) :
To do so, we will choose a segment of IP addresses for every VLAN (for example 192.168.10.0
/24 for the management VLAN, 192.168.20.0 /24 for the data VLAN…)
21
Figure II-5: Assigning IP addresses to the VLANs
To test if it works, we will need to try pinging from one device to another (Figure II-6).
Now, we will need to get rid of the console cable and find a way to communicate remotely with
our switch through a simple Ethernet cable. There are multiple ways like Telnet but we choose
SSH because it is the most secure way to access the switch.
The figure below shows the configuration for SSH login (Figure II-7):
22
Figure II-7: Configuring SSH
Now that SSH is configured, a user should be created for it (Figure II-8):
Now, we can use SSH to access our switch remotely using an Ethernet Cable and a terminal
emulator software (PuTTy in our case) (Figure II-9).
23
5.2. PacketFence configuration on the switch
5.2.1. RADIUS server configuration
In order for the switch to communicate with PacketFence as a RADIUS source server, it must
be assigned the PF address with a key. This last one is mentioned when adding the switch to
the list of network devices at the PacketFence level.
The "domain" commands create the "PF" domain and relate it to the earlier mentioned
accounting, and authentication schemes. The RADIUS server to be used, "PacketFence" is
specified by the "radius-server" command.
Finally, the "mac-authen" command enables MAC authentication while the "dot1x enable"
command activates 802.1X authentication.
24
Figure II-11: Enabling AAA and 802.1X at the switch level
The commands create a local engine ID, which is represented by the value
'800007DB0304F9389D2360'. It distinguishes the switch's SNMP agent from other network
devices. Configure community strings for read and write access, and set up the SNMP agent.
The community strings are secured by encryption. Additionally, the commands state that
SNMP version 2c should be used for this protocol’s system information version. Overall, these
commands enable the switch's SNMP functionality and create a secure connection for network
device monitoring and management.
25
An ACL with the switch's ID 3000 is configured using the commands given. The destination
IP range 192.168.10.0/24 is not allowed to receive IP traffic from the source IP range
192.168.20.0/24, according to Rule 5. Regardless of the source IP or the destination IP, IP
traffic is allowed under Rule 10. On interface GigabitEthernet0/0/22, the ACL is subsequently
used as an outgoing traffic filter (Figure II-13).
5.2.5. Configuring the switch ports for 802.1X, MAB and VoIP
To configure the switch port, we first enable the switch ports for hybrid mode, then enable
802.1X and MAB authentication in the interface range [7-46] and the 47th and 48th ports will
be configured as VoIP ports.
The endpoint requester must send a periodic EAP over LAN (EAPoL-Start) message in the
switchport to speed up the authentication. If a device cannot authenticate using the 802.1X
protocol due to the nature and waiting time assigned to the 802.1X protocol, it can try to
authenticate using the MAB protocol. If its MAC address is in the PacketFence internal
database, it is then allowed to access the network (Figure II-14).
26
❖ Minimum Hardware Requirements
PacketFence includes a web-based interface that enables step-by-step the settings of NAC. The
configuration procedure is composed of several steps.
In this step, we are asked to select an enforcement mechanism (Figure II-15), we can choose
either the Inline mode (all the traffic needs to pass through PacketFence), the VLAN mode
(PacketFence is Out-of-Band) or both.
In our case, we will use the VLAN enforcement mode since it is the preferred way of deploying
PacketFence and since we will only apply the solution to devices manageable with 802.1X and
MAB support (Mac-authentication Bypass).
The decision taken at this phase will have an impact on the following steps, where we will set
up the various networks.
27
● Step 2 : Interfaces configurations
Specification of the network addresses and system interfaces where the DHCP server will
provide its service for the devices that are trying to access the network. We'll apply the
configuration that is specified in the figure below (Figure II-16).
To enable PacketFence and establish connections, we will define the scheme for the database
and a user. Additionally to a domain and Hostname which will identify the server, and create
the administrative user to access the PacketFence Administration Web Interface (Figure II-
17).
28
● Step 4 : NAC Configuration
In this last step, all services will begin, and we will gain access to the management interface
through https://192.168.10.183:1443.
Server name DC
IP address 192.168.10.136
The next step in getting ready for using AD to authenticate with PacketFence is to create an
organizational unit (OU) called "Groups" in Active Directory, which is used for storing LDAP
objects (users, groups, computers, printers, and other OUs) to be used for employee, guest, and
intern authentication. After that, we added the users (Figure II-18).
29
5.3.3. PacketFence and AD integration
Before we can use Active Directory to control authentication to PacketFence for users, we need
to join PacketFence to the domain. To do this, it is necessary to :
➢ Add a domain administrator account to PacketFence. Once it has joined AD, we get the
following result (Figure II-20):
The last step is to add our created domain to "REALMS" where you define how PacketFence
should direct authentication depending on the username (Figure II-21).
30
Figure II-21: Adding created domain to Realms
The network device is going to be configured to work together with PacketFence. Within the
configuration menu, we can locate the Network Devices subgroup, Switches option
(Configuration > Switches > NEW SWITCH > default): We proceed to enter the configuration
required for the equipment (switch) that will enter in production.
31
Figure II-23: Switch Definition
➢ In the Roles tab (Figure II-24), define the roles and the corresponding VLANs. For
example, the unregistered device must not belong to any specific VLAN (2 by default)
but the registered ones with the correct user credentials will be switched to data VLAN
20 (employee, stagiaire and guest should all be in the data VLAN).
➢ In the RADIUS tab (Figure II-25), Enter the same secret key as shared-key on the
switch when configuring the 802.1X protocol on the S5735 switch and the “use CoA
box” should be checked with the “CoA port” “3799”.
32
Figure II-25: Radius passphrase configuration
➢ At the end, provide the same community write and read configured on the switch in the
SNMP tab (Figure II-26).
➢ Description: DC rules
➢ Host: 192.168.10.136 (the IP address of the AD domain) / 389 is the default port that
AD and LDAP use
➢ Base DN: DC=ad, DC=lab (the full path to our users accounts. In our case, we specified
the highest branches of the tree)
➢ Scope: Subtree
➢ Username attribute: sAMAccountName (The name of the field that PacketFence will
use to authenticate users.).
33
➢ Bind DN: CN=Administrator, CN=Users, DC=ad, DC=lab (The full AD path of a user
with domain admin rights)
➢ Password: Sdfg1234+ (The password for the account that we used with Bind DN)
After we filled the fields with the required information, we should now add rules to grant users
by assigning roles for each type of users and access duration to the network.
34
We created 3 rules (Figure II-28), (Figure II-29), (Figure II-30). They are expressed as If
condition X, then Y. Where there are multiple possible X conditions and Y actions. For
authentication rules, actions *must* set a role, an access duration (in hours), or an expiration
date (a future date).
We may need to carefully consider the sequence because we may obviously set many rules and
they are evaluated in order, from top to bottom (just like with firewalls!).
● Employees rule:
➢ For this rule, we specified as a condition that the user must belong to
“CN=Employee,OU=Groups,DC=ad,DC=lab” who was created in section 5.3.2.
➢ Based on that, it then applies the user role of Employee and sets access duration to 1
year.
● Interns rule:
35
➢ For this rule, we specified as a condition that the user must belong to
“CN=Stagiaire,OU=Groups,DC=ad,DC=lab”.
➢ Based on that, it then applies the user role of Stagiaire and sets access duration to 6
months.
● Guests rule:
➢ For this rule, we specified as a condition that the user must belong to
“CN=Guest,OU=Groups,DC=ad,DC=lab”.
➢ Based on that, it then applies the user role of Guest and sets access duration to 1 day
and the bandwidth balance to 4MB.
To evaluate the created rules, we run the ./pftest authentication script in a shell (Figure II-
31), as we make changes with test user cases.
36
5.5. Connection profiles definition for 802.1X and MAC authentication
The connection profiles in PacketFence allow us to authenticate a number of types of
connection sessions using various standard authentication protocols, including PAP (Password
Authentication Protocol), CHAP (Challenge-Handshake Authentication Protocol), PEAP
(Protected Extensible Authentication Protocol) and EAP (Extensible Authentication Protocol).
PacketFence specifies the authorized protocol available for the network devices on which the
user attempts to authenticate and specifies the identity sources from which the user's
authentication is validated. Rule-based connection profiles consist of attribute-based filters that
determine the authorized protocols and the identity source to be used for processing requests.
● 802.1X profiles :
This connection profile in (Figure II-32) is to use the 802.1X protocol, and it
authenticates user accounts using the Active directory as authentication source for users
credentials.
Note: When a client connects through Ethernet-EAP, it signifies that 802.1X credentials are
being used.
37
6. Developing the Python Application for the Tests
Before going to the testing phase, we coded a python app (Figure II-33) that will help us in
our NAC solution testing process, and also in every future project in the network and security
fields. This app is called “Your Network Friend” and has multiple features which are:
● Perform a DNS or reverse DNS lookup to retrieve the domain name associated with an
IP address or the opposite.
38
7. Conclusion
In this chapter, we created a practical architecture for implementing the PacketFence solution
in a wired network. We successfully completed the implementation process despite difficulties
with unfamiliar technology and little knowledge. We talked about the integration and
configuration needs for a secure access control system.
We defined deployment phases and network topology for success. The infrastructure
configuration included setting up the basic switch with interfaces, VLANs, DHCP, and SSH
settings. After that, we set up PacketFence on the switch, activating RADIUS, AAA, dot1x,
and SNMP. Additionally, we connected PacketFence to the Active Directory domain
controller.
For network access control, we specified authentication sources and policies, as well as
connection profiles for MAC and 802.1X authentication. In addition, we created a desktop
program to automate device configuration and optimize network activities.
The above steps let us effectively integrate PacketFence into our network and set up a reliable
Access Control system.
We will concentrate on ongoing management and monitoring of the NAC solution in the
following chapter to ensure its continued efficacy and security in our network environment.
39
CHAPTER III: Testing phase
1. Introduction
Once the solution has been implemented, we proceed to the test phase in order to ensure the
proper functioning of the equipment and configuration. Verification consists of trying to
connect to wired networks, with two scenarios: once as an employee and once as an intern.
40
Figure III-2: Enabling wired autoConfig service
After that we need to enable 802.1X authentication on the Ethernet interface, as shown in the
figure below (Figure III-3):
In the authentication method (Figure III-4), we make sure "Secured password (EAP-
MSCHAPv2)" is selected in the EAP protocol settings and that "Validate server certificate" is
not checked. Following that, click Configure and make sure the box next to "Automatically use
41
my Windows logon name and password (and domain, if any)" is not checked. Then validate
these operations (click on ok).
As soon as the cable is connected to the Ethernet interface of the machine, the authentication
window appears (Figure III-5):
in ‘PacketFence audit logs’, the connection profile "802.1X" is applied to the employee and
intern with the authorization status ‘Accept’ for correct credentials (Figure III-6):
42
Figure III-6: Authentication on the PacketFence side
Note: in case the user attempts to enter incorrect credentials, the status "Rejected" appears.
As we can see in the figure below (Figure III.7) the full Authentication RADIUS reply. These
attributes explain the authentication and authorization procedures of the PacketFence NAC
system for the user "idirstg". The answer indicates that the authentication was successful, as
indicated by the HTTP status code 200, and the user is granted access to VLAN 20.
After the authentication process, the new node has access to the local network (VLAN 20) with
the default network 192.168.20.0/24 and will be added to PacketFence's local node database
with a registered status and user role based on the credentials entered, as shown in the figure
below (Figure III-8):
43
Figure III-8: Registered nodes
As we can see (Figure III-9), registered users have their own devices where we can see all
proper information such as status, role, unregistration date and other information in info ,
location tabs (connection type/port, last seen...) with the possibility of revoking the access by
restarting the switch port.
Below (Figure III-10) is a simple representation of our radial network with all it’s nodes:
44
Figure III-10: Radial model for detected nodes
45
4.2. Scanning the open and closed ports on a specific IP address
This feature scans the open ports on an IP address that you enter and in a specific range, it also
displays your internet download and upload speed (the speed failed because our main network
is isolated) (Figure III-12).
46
4.4. Pushing a configuration into the switch
This feature pushes directly any configuration into our S5735 switch remotely, we just have to
enter the .txt file (that contains any commands) path, IP address and SSH credentials and click
on ‘PUSH’ (Figure III-14).
47
5. Conclusion
In this chapter, we pushed our network's PacketFence Network Access Control (NAC) system
through a series of tests. To help people understanding PacketFence functionality, we offered
a clear flow chart that demonstrated the system's operating flow and decision-making
procedures.
Then, we concentrated on analyzing MAC and 802.1X authentication methods while testing
domain user authentication. We evaluated PacketFence capability to accurately apply access
control policies through simulations of real-world situations and user interactions.
We created the "Your Network Friend" desktop program for testing purposes, which
considerably benefited us in comprehending Python coding and network management tools.
In conclusion, PacketFence feasibility in our network environment was verified by our careful
testing, which confirmed its successful implementation and functionality.
48
Conclusion and Future Works
As part of this project for the Sonatrach company, and based on a concern for security and the
need to protect critical and vital resources on a permanent basis, we implemented a wired
Network Access Control solution which ensures that only authorized persons have access to
the network. This solution is even more necessary when you consider that, in some
establishments, the number of users who frequently request access to the network is very high.
After an in-depth analysis of the company's needs, we were able to carry out a comparative
study of various possible solutions, which led us to adopt the PacketFence solution and validate
it in a test environment. We deployed the PacketFence solution, which reacts, in real time, to
any attempt to connect to the network by reference to the security policies predefined in the
PacketFence platform.
The user is asked to authenticate himself by presenting his user account and associated
password if he belongs to the domain, and obtains Internet access. The verification of customer
machine conformity status validation was not required on the part of the company due to the
complexity of the network architecture so that they could offer us an antivirus server.
Regardless of all the difficulties encountered, we were able to achieve our goal of implementing
the solution in the cable network. Our future plans include :
- To implement the solution in the wireless network in order to benefit more from the solution.
- Check the status of the operating system updates and the existence of certain security
applications to ensure compliance.
49
References
[1] D. Kang, J. Oh, and C. Im, “A Study on Abnormal Behavior Detection in BYOD Environment,”
vol. 7, no. 12, 2013.
[4] T. Grance, J. Hash, S. Peck, J. Smith, and K. Korow-Diks, “Security guide for interconnecting
information technology systems,” National Institute of Standards and Technology, Gaithersburg,
MD, NIST SP 800-47, 2002. doi: 10.6028/NIST.SP.800-47.
[6] “Network Access Control,” Wikipedia. Feb. 07, 2023. Accessed: Feb. 08, 2023. [Online].
Available:
https://en.wikipedia.org/w/index.php?title=Network_Access_Control&oldid=1137953892
[7] M. S. Inamdar and A. Tekeoglu, “Security Analysis of Open Source Network Access Control in
Virtual Networks,” in 2018 32nd International Conference on Advanced Information Networking
and Applications Workshops (WAINA), Krakow: IEEE, May 2018, pp. 475–480. doi:
10.1109/WAINA.2018.00131.
[8] E. Engfors and J. Markstedt, “Luleå University of Technology Department of Systems and Space
Engineering May 28, 2017”.
[9] DRosolen, “How to choose the best Network Access Control solution ( NAC ),” Silicon, Apr. 13,
2009. https://www.silicon.es/como-elegir-la-mejor-solucion-de-control-de-acceso-a-la-red-nac-
751 (accessed Feb. 08, 2023).
[13] “IEEE 802.1X,” Wikipedia. Dec. 30, 2022. Accessed: Feb. 09, 2023. [Online]. Available:
https://en.wikipedia.org/w/index.php?title=IEEE_802.1X&oldid=1130430396
[14] “RADIUS,” Wikipedia. Jan. 19, 2023. Accessed: Feb. 27, 2023. [Online]. Available:
https://en.wikipedia.org/w/index.php?title=RADIUS&oldid=1134635324
50
2023).
[19] H. N. Security, “Network Access Control (NAC),” Help Net Security, Nov. 26, 2007.
https://www.helpnetsecurity.com/2007/11/26/network-access-control-nac/ (accessed Feb. 08,
2023).
[22] “UNIFIED ACCESS CONTROL.” Accessed: Feb. 25, 2023. [Online]. Available:
https://www.juniper.net/assets/us/en/local/pdf/brochures/1500051-en.pdf
[24] “PacketFence | Open Source NAC.” https://www.packetfence.org/ (accessed Feb. 25, 2023).
[25] “The FreeNAC Open Source Project on Open Hub.” https://www.openhub.net/p/8572 (accessed
Feb. 25, 2023).
[26] “FreeRADIUS,” Wikipédia. Aug. 27, 2019. Accessed: Mar. 01, 2023. [Online]. Available:
https://fr.wikipedia.org/w/index.php?title=FreeRADIUS&oldid=162155981
[27] “Snort - Network Intrusion Detection & Prevention System.” https://www.snort.org/ (accessed
Mar. 01, 2023).
51
Appendix 1: Host Organization
The company's export sales climbed by 75% in 2021, bringing the year's total revenues up to
US$35 billion from US$20 billion. The results can be explained by the "return of global
economic activity in 2021," according to vice president Rachid Zerdani. 95 million ToE worth
of exports resulted from an increase in production to 185 million ToE. More than 53,000 people
worked at Sonatrach, while more than 150,000 people were engaged in its subsidiaries.
1.3. Subsidiaries
Enac, Sipex, Enageo, Ensp, Hyproc SC, Tassili Airlines, Naftal, ENTP, Enip, Enafor, ENGTP.
1.4.1. Missions
The SONATRACH's essential missions are as follows, under the direction of a general director:
-The creation, maintenance, and exploitation of energy networks across the national frontier.
the transformation of export-oriented markets and goods.
- The commercial tool's adaptation to the needs of the energy market for a better understanding
of its workings and improved commercial performance.
-The setting up, managing, and maintaining complexes for the production, transportation, and
conditioning of hydrocarbons.
52
-The study, promotion, exploitation, processing, and refinement of hydrocarbons.
-The growth of any joint venture between Algerian businesses and foreign businesses both
inside and outside of Algeria.
-The investigation, support, and valorization of any other energy source or form.
-the growth of any activity, regardless of method, that has a connection to the hydrocarbon
sector. Additionally, any activity that might spark interest in Sonatrach as well as any general
activity of any kind that might be directly related to its corporate objectives.
1.4.2. Objectives
-Buying and keeping any portfolio of shares. Equity stakes and other movable assets in any
active company, whether it was founded in Algeria or elsewhere
-The creation, administration, and management of hydrocarbon transport, storage, and loading.
1.5. Presentation of the organizational chart of the reception structure
53
1.6. Department of Reception Presentation (DC-DSI):
DC-DSI: The Central Directorate of Digitalization & Information System:
The Central Directorate-CIO (DC-CIO) is the main processing directorate of the company
SONATRACH in computer science, it constitutes:
The preferred tool of the general directorate in terms of IT. The treatment center from the
central directions.
The (DC-DSI) does not exercise direct supervision over the company's structures in matters IT,
she is the company's interlocutor for all relations in these matters with external organizations.
Its organization is based on the following activities :
The fundamental distribution between the activity of realization of computer products and
those of their use.
The grouping into homogeneous entities of basic activities that can integrate into sets
consistent.
The provision of operational autonomy to internal structures allowing them to search for
profitability.
The minimization of the dependence of internal structures by the use of equipment and
adequate software The continuous promotion of computer science by the provision of users Of
adapted skills and means.
The possibility of taking over the management of the IT equipment of the structures which
would be entrusted to him.
54