Module 13 Endpoint Security
Module 13 Endpoint Security
Module 13 Endpoint Security
News media commonly cover external network a acks on enterprise networks. These are some
examples of such a acks:
DoS a acks on an organiza on’s network to degrade or even halt public access to it
Breach of an organiza on’s data servers and hosts to steal confiden al informa on
Various network security devices are required to protect the network perimeter from outside access.
As shown in the figure, these devices could include a hardened ISR that is providing VPN services, an
ASA firewall appliance, an IPS, and a AAA server.
The figure shows a topology with security devices securing the perimeter of the network.
Many a acks can, and do, originate from inside the network. Therefore, securing an internal LAN is
just as important as securing the outside network perimeter. Without a secure LAN, users within an
organiza on are s ll suscep ble to network threats and outages that can directly affect an
organiza on’s produc vity and profit margin. A er an internal host is infiltrated, it can become a
star ng point for an a acker to gain access to cri cal system devices, such as servers and the
sensi ve informa on they contain.
Historically, employee endpoints were company-issued computers which resided within a clearly
defined LAN perimeter. These hosts were protected by firewalls and IPS devices which worked well
with hosts that were connected to the LAN and behind the firewall.
An virus/An malware So ware - This is so ware installed on a host to detect and mi gate
viruses and malware. Companies that provide an -virus so ware include Norton, TotalAV,
McAfee, MalwareBytes and many others.
Host-based IPS - This is so ware that is installed on the local host to monitor and report on
the system configura on and applica on ac vity, provide log analysis, event correla on,
integrity checking, policy enforcement, rootkit detec on, and aler ng. Examples include
Snort IPS, OSSEC, and Malware Defender, among others.
Host-based firewall - This is so ware that is installed on a host that restricts incoming and
outgoing connec ons to those ini ated by that host only. Some firewall so ware can also
prevent a host from becoming infected and stop infected hosts from spreading malware to
other hosts. Included in some opera ng systems such as Windows, or produced by
companies such as NetDefender, Zone alarm, Comodo Firewall, and many others.
The network has evolved to include tradi onal endpoints and new, lightweight, portable,
consumerized endpoints such as smartphones, tablets, wearables, and others. The new bring-your-
own-device (BYOD) needs of workers require a different way of approaching endpoint security. These
new endpoints have blurred the network border because access to network resources can be
ini ated by users from many loca ons using various connec vity methods at any me.
There are some problems with the tradi onal method of securing endpoints. In many networks, the
network-based devices are disparate and typically do not share informa on among themselves.
Addi onally, new endpoint devices are not good candidates for the tradi onal host-based endpoint
security solu ons because of the variety of devices and the variety of opera ng systems available on
those devices.
The challenge is allowing these heterogeneous devices to connect to enterprise resources securely.
13.1.4 Security for Endpoints in the Borderless Network
Larger organiza ons now require protec on before, during, and a er an a ack. IT administrators
must be able to answer the following ques ons:
Organiza ons must also protect their endpoints from new threats and provide the protec on
measures that are outlined in the table below.
Measure Purpose
data loss preven on (DLP) Prevent sensi ve informa on from being lost or stolen.
New security architectures for the borderless network address security challenges by having
endpoints use network scanning elements. These devices provide many more layers of scanning than
a single endpoint possibly could. Network-based malware preven on devices are also capable of
sharing informa on among themselves to make be er informed decisions.
The figure shows generic icons for the following sec ons: next genera on firewalls, intrusion
preven on systems, network access control, gateway security, and endpoint security.
The following are examples of devices and techniques that implement host protec ons at the
network level.
Advanced Malware Protec on (AMP) – This provides endpoint protec on from viruses and
malware.
Email Security Appliance (ESA) – This provides filtering of SPAM and poten ally malicious
emails before they reach the endpoint. An example is the Cisco ESA.
Web Security Appliance (WSA) – This provides filtering and blocking of websites to prevent
hosts from reaching dangerous loca ons on the web. The Cisco WSA provides control over
how users access the internet and can enforce acceptable use policies, control access to
specific sites and services, and scan for malware.
Network Admission Control (NAC) – This permits only authorized and compliant systems to
connect to the network.
These technologies work in concert with each other to give more protec on than host-based suites
can provide, as shown in the figure.
13.1.6 Hardware and So ware Encryp on of Local Data
Endpoints are also suscep ble to data the . For instance, if a corporate laptop is lost or stolen, a
thief could scour the hard drive for sensi ve informa on, contact informa on, personal informa on,
and more.
The solu on is to locally encrypt the disk drive with a strong encryp on algorithm such as 256-bit
AES encryp on. The encryp on protects the confiden al data from unauthorized access. The
encrypted disk volumes can only be mounted for normal read/write access with the authorized
password.
Opera ng systems such as MAC OSX na vely provide encryp on op ons. The Microso Windows 10
opera ng system also provides encryp on na vely. Individual files, folders, and drives can be
configured to encrypt data. In Windows, BitLocker provides drive encryp on, as shown in the figure.
Files can also be encrypted, but because applica ons can create unencrypted back up files, the en re
folder that the file is stored in should be encrypted.
The purpose of network access control (NAC) is to allow only authorized and compliant systems,
whether managed or unmanaged, to access the network. It unifies endpoint security technologies
with user or device authen ca on and network security policy enforcement. A NAC system can deny
network access to noncompliant devices, place them in a quaran ned area, or give them only
restricted access to compu ng resources, thus keeping insecure nodes from infec ng the network.
NAC systems can have the following capabili es:
Profiling and visibility - This recognizes and profiles users and their devices before malicious
code can cause damage.
Guest network access - This manages guests through a customizable, self-service portal that
includes guest registra on, guest authen ca on, guest sponsoring, and a guest management
portal.
Security posture checking - This evaluates security-policy compliance by user type, device
type, and opera ng system.
Incident response - This mi gates network threats by enforcing security policies that block,
isolate, and repair noncompliant machines without administrator a en on.
NAC systems should extend NAC to all network access methods, including access through LANs,
remote-access gateways, and wireless access points.
The Cisco Iden ty Services Engine (ISE) combines AAA and network device profiling into a single
system.
The goal of NAC systems is to ensure that only hosts that are authen cated and have had their
security posture examined and approved are permi ed onto the network. For example, company
laptops used offsite for a period of me might not have received current security updates or could
have become infected from other systems. Those systems cannot connect to the network un l they
are examined, updated, and approved.
Network access devices can func on as the enforcement layer, as shown in the figure. They force the
clients to query a RADIUS server for authen ca on and authoriza on. The RADIUS server can query
other devices, such as an an virus server, and reply to the network enforcers.
The figure shows network access devices enforcing security by requiring users to query a RADIUS
server for authen ca on and authoriza on.
The IEEE 802.1X standard defines a port-based access control and authen ca on protocol that
restricts unauthorized worksta ons from connec ng to a LAN through publicly accessible switch
ports. The authen ca on server authen cates each worksta on that is connected to a switch port
before making available any services offered by the switch or the LAN.
The figure shows that with 802.1X port-based authen ca on, the devices in the network have
specific roles.
The figure is a topology diagram showing 8 0 2.1 X roles. There is a switch labeled authen cator
connected to a server labeled authen ca on server (radius). the switch is also connected to two
individual computers labeled supplicant. text under the switch says controls physical access to the
network based on client authen ca on status. text under the server is performs client
authen ca on. text under the supplicant computer states requires access and responds to requests
from the switch.
802.1X Topology
Supplicant (Client) - The device (worksta on) that requests access to LAN and switch
services and then responds to requests from the switch. The worksta on must be running
802.1X-compliant client so ware. (The port that the client is a ached to is the
supplicant [client] in the IEEE 802.1X specifica on.)
Authen cator (Switch) - This device controls physical access to the network based on the
authen ca on status of the client. The switch acts as an intermediary (proxy) between the
client (supplicant) and the authen ca on server, reques ng iden fying informa on from the
client, verifying that informa on with the authen ca on server, and relaying a response to
the client. The switch uses a RADIUS so ware agent, which is responsible for encapsula ng
and de-encapsula ng the EAP (Extensible Authen ca on Protocol) frames and interac ng
with the authen ca on server.
Authen ca on server - This server performs the actual authen ca on of the client. The
authen ca on server validates the iden ty of the client and no fies the switch whether the
client is authorized to access the LAN and switch services. Because the switch acts as the
proxy, the authen ca on service is transparent to the client. The RADIUS security system
with EAP extensions is the only supported authen ca on server.
Un l the worksta on is authen cated, 802.1X access control enables only Extensible Authen ca on
Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic
through the port to which the worksta on is connected. A er authen ca on succeeds, normal traffic
can pass through the port.
The switch port state determines whether the client is granted access to the network. When
configured for 802.1X port-based authen ca on, the port starts in the unauthorized state. While in
this state, the port disallows all ingress and egress traffic except for 802.1X protocol, STP, and CDP
packets. When a client is successfully authen cated, the port transi ons to the authorized state,
allowing all traffic for the client to flow normally. If the switch requests the client iden ty
(authen cator ini a on) and the client does not support 802.1X, the port remains in the
unauthorized state, and the client is not granted access to the network.
In contrast, when an 802.1X-enabled client connects to a port and the client ini ates the
authen ca on process (supplicant ini a on) by sending the EAPOL-start frame to a switch that is not
running the 802.1X protocol, no response is received, and the client begins sending frames as if the
port is in the authorized state.
The figure shows the complete message exchange between the supplicant, authen cator, and the
authen ca on server. The encapsula on occurs as follows:
Between the supplicant and the authen cator - EAP data is encapsulated in EAPOL frames.
Between the authen cator and the authen ca on server - EAP data is encapsulated using
RADIUS.
If the authen ca on fails, the port remains in the unauthorized state, but authen ca on can be
retried. If the authen ca on server cannot be reached, the switch can retransmit the request. If no
response is received from the server a er the specified number of a empts, authen ca on fails, and
network access is not granted.
When a client logs out, it sends an EAPOL-logout message, causing the switch port to transi on to
the unauthorized state.
It may be necessary to configure a switch port to override the 802.1X authen ca on process. To do
this, use the authen ca on port-control interface configura on command to control the port
authoriza on state. The parameters for this command are shown below. The individual port on the
authen cator switch is configured with this command, in this case, port F0/1 of S1. By default, a port
is in the force-authorized state meaning it can send and receive traffic without 802.1x
authen ca on.
The figure is a topology diagram showing the Authen cator switch between the authen ca on
server and the supplicant.
Parameter Descrip on
Enables 802.1X port-based authen ca on and causes the port to begin in the
unauthorized state. During this me only EAPOL, STP, and CDP frames are the only
auto
type of frames that can be sent or received through the port un l the client device
has been authen cated.
The port sends and receives normal traffic without 802.1x-based authen ca on of
force-authorized
the client. This is the default se ng.
Parameter Descrip on
Causes the port to remain in the unauthorized state, ignoring all a empts by the
force-unauthorized client to authen cate. The switch cannot provide authen ca on services to the
client through the port.
The auto keyword must be entered to enable 802.1X authen ca on. Therefore, to enable 802.1X on
the port, use the authen ca on port-control auto interface configura on command.
If the client is successfully authen cated (receives an Accept frame from the authen ca on server),
the port state changes to authorized, and all frames from the authen cated client are allowed
through the port. If the authen ca on fails, the port remains in the unauthorized state, but
authen ca on can be retried. If the authen ca on server cannot be reached, the switch can resend
the request. If no response is received from the server a er the specified number of a empts,
authen ca on fails, and network access is not granted.
When a client logs off, it sends an EAPOL-logoff message, causing the switch port to change to the
unauthorized state.
If the link state of a port changes from up to down, or if an EAPOL-logoff frame is received, the port
returns to the unauthorized state.
This scenario is implemented the same topology as above. A PC is a ached to F0/1 on the switch and
the device is will be authen cated via 802.1X with a RADIUS server. Unlike in previous AAA scenarios
in which administrators were authen cated to the router configura on lines, in this scenario, an
endpoint is authen cated before access is granted to the network.
Enable AAA.
Enter RADIUS server configura on mode and name the configura on NETSEC.
Configure the RADIUS server address to 10.1.1.50 with the authen ca on port of 1812 and
the accoun ng port of 1813.
S1(config)#aaa new-model
S1(config-radius-server)#key RADIUS-Pa55w0rd
S1(config-radius-server)#exit
Specify an 802.1x port-based default authen ca on method list with the primary op on
RADIUS.
S1(config)#dot1x system-auth-control
Enable 802.1x authen ca on with the Port Access En ty (PAE) type so the interface acts only
as an authen cator.
Use the end command to exit from configura on mode.
S1(config)#interface F0/1
S1(config-if)#end
Network Access Control is a system that can check whether endpoints that a empt to the network
comply with network security policies. It handles user authen ca on and can take ac on against
devices that violate security policies by having out date security so ware. It can even take ac on to
bring devices up to compliance standard before allowing access. NAC can also provide easy to
manage methods of providing network access to guest computers that require connec vity to the
network. Cisco ISE combines AAA and NAC and into a single system.
802.1X Authen ca on
802.1X provides a means by which authen cator network access switch can act as an intermediary
between a client and an authen ca on server. The switch forwards authen ca on informa on from
the client to the server. If authen ca on is successful, the client will be allowed to access the
network through the connected switch port. If authoriza on fails, the switch will not permit the
client endpoint to connect to the network. The system uses the EAP and EAPOL to carry
authen ca on traffic between the switch and the authen cator switch. The switch uses EAP and
RADIUS to communicate with the authen ca on server. The 802.1X authen ca on process can be
control by configuring the authen cator port with the authen ca on port-control command. The
port can be set carryout the authen ca on process, provide authorized access, or to be in
unauthorized state. In this state no device will be able to connect to the network.
802.1X port-based authen ca on is configured by first globally ac va ng AAA and by specifying the
RADIUS server name, address, and ports. A er that the authen cator interface is configured with
802.1X parameters.